[Next] [Up] [Previous] [Contents]
Next: 6.3 [IMAGE ]Is it Up: 6. Applying CPRBASEC Previous: 6.1 How do I

6.2 [IMAGE ]How can security-aware applications apply confidentiality and integrity to data (e.g. electronic documents)?