Next:
5.2.1.1 What is DAIS
Up:
5.2 Particular Implementations
Previous:
5.2 Particular Implementations
5
.
2
.
1
DAIS Security
5
.
2
.
1
.
1
What is DAIS Security?
5
.
2
.
1
.
2
What is the current version of DAIS Security
5
.
2
.
1
.
3
What is the current status of DAIS Security?
5
.
2
.
1
.
4
Does DAIS conform to CORBASEC specifications?
5
.
2
.
1
.
5
Why did ICL choose the CSI-ECMA security mechanism in its DAIS Security implementation?
5
.
2
.
1
.
6
What features does DAIS Security offer?
5
.
2
.
1
.
7
What is the advantage of using roles in DAIS Security?
5
.
2
.
1
.
8
What are the advantages (and disadvantages) of using public key technology in DAIS Security?
5
.
2
.
1
.
9
What are the advantages (and disadvantages) of using secret key technology (passwords) in DAIS Security?
5
.
2
.
1
.
10
Why have domains in DAIS Security?
5
.
2
.
1
.
11
Why policy domains?
5
.
2
.
1
.
12
Where can find more information on DAIS Security?