4.2 Implementation and Verification of Security Components