Next:
6.3 Is it possible
Up:
6. Applying CPRBASEC
Previous:
6.1 How do I
6
.
2
How can security-aware applications apply confidentiality and integrity to data (e.g. electronic documents)?