Abstract
In what follows, we discuss aspects that would make a security solution work in practice. Experience shows that adding security components does not necessarily raise the level of trust of a security solution. Some of the questions we try to answer include: Is my security solution sufficiently complete to work in a real and living IT environment? How do I make my solution trustworthy? With these arrows in hand, we pursue the target of building a trusted solution by considering several trust principles.