next up previous contents
Next: 6.3 Is it possible Up: 6. Applying CPRBASEC Previous: 6.1 How do I

6.2 ../images/blueball.gifHow can security-aware applications apply confidentiality and integrity to data (e.g. electronic documents)?