Dominant approach

Dominant approach

database access &

authorization agent

source

customer

result

query

authentication

Gio Wiederhold TIHI Oct96 *

firewall

Previous slide Next slide Back to the first slide View Graphic Version