Security considerations for notifications
Issues
Security application domains
Security needs
Security needs (contd.)
Trust models: “hop-by-hop” vs “end-to-end”
Download presentation source