I. Introduction
Problems of confidentiality, integrity, availability, and authenticity in various environments are all subsumed under the term system security. Each of these problems enjoys having seen different ingenious solutions under specific circumstances, but a common framework to treat all four aspects with a single toolbox is yet missing.