Summary
This slide was not used.
- Enterprise model
- concepts
- relationship to security requirements
- Naming model
- identification
- making comparisons and distinctions
- ANSA object model
- Encapsulation and interaction
- Granularity of control
- Infrastructure model
- transparent security
- generic and specialised components
Introduction ->1 ->2
->3 ->4 ->5
->6