[Next]
[Up]
[Previous]
[Contents]
Next:
6.3 [IMAGE ]Is it
Up:
6. Applying CPRBASEC
Previous:
6.1 How do I
6
.
2
[IMAGE ]
How can security-aware applications apply confidentiality and integrity to data (e.g. electronic documents)?