Go to content Phone human-readable description of the message we trying to accomplish. Search human-readable description of the message we trying to accomplish. Map pin human-readable description of the message we trying to accomplish.

Showing all entries in ‘Blog’






A matter of policy…

My previous blog introduced an access management platform called ‘Oasis’, developed as part of my thesis many years ago, and made the case for its relevance for IoT today. This blog will look a little deeper into how the solution could be used in practice. As explained previously, Oasis relies on issuing ‘roles’ to client apps and devices. These roles indicate a function or capability of the client and, implicitly, the access afforded to them.

Read More



Trust me, I’m a robot

Much is written about the need for IoT security and Trustonic, as well as other companies, has focused on providing the core capabilities needed for such a secure system. However, mapping the device to the user, or other authority that it represents, remains a black art. However, currently we have to just trust that some of the vendor-specific “magic”  works.

Read More


Four Key Takeaways from GlobalPlatform’s TEE Seminar

After a busy day hearing from the industry’s Trusted Execution Environment (TEE) experts at GlobalPlatform’s TEE Seminar in Beijing, I’m back to business as usual. Amid the varied use cases, new deployments and vast potential for the TEE to provide security for digital services and devices, there were several stand-out themes and important takeaways for organisations involved in delivering digital services.

Read More



Back to top