next up previous contents index
Next: Process Management Up: Components: Things and Actions Previous: Authorization

Data Privacy

Communication is protected with an encryption algorithm. Alternatively, objects may be encrypted. Digital signatures can verify the content.

Data privacy actions include encrypt, decrypt, sign, and verify.



Ronald LeRoi Burback
Wed Jul 30 10:49:53 PDT 1997