next up previous
Next: Process Management Up: Components: Things and Actions Previous: Authorization

Data Privacy

Communication is protected with an encryption algorithm. Alternatively, objects may be encrypted. Digital signatures can verify the content.

Data privacy actions include encrypt, decrypt, sign, and verify.



Ronald LeRoi Burback
1998-12-14