Trusted signature with key access permissions
Trusted system
Trusted time stamping storage system
Trustworthy timestamps and certifiable clocks using logs...
Two way authentication protocol
Two-way authentication between two communication endpoints...