Security and trustworthiness at the edge

Summary
Security and trustworthiness at the edge