Security Requirements
Confidentiality
Non-repudiation
Data integrity
Authentication
Authorization
Key Management
Question: where do we put the security
Previous slide
Next slide
Back to first slide
View graphic version