Security Model

Given the Ecosystem context and the Threat model explained in the previous sections, this section presents the security model that should ideally be enforced.

It covers the basic principles, rules and objectives to consider when building a secure system. It may be changed to fit into use case and threat model modification or specific needs.

Work in progress

This security model is not yet properlly defined. Comments and feedbacks are welcome. Discuss it on Github