Trusted Computing (TC) has become meanwhile an established technology for verification and implementation of integrity and security at personal computers. Similar requirements are also needed for embedded computing platforms which have alike trust and security problems due to the increasing complexity and therefore instability of Os and applications as well as connection to the Internet with its s ...