Challenges All Applications Face
Authentication of Users
Non-repudiation for transactions
Confidentiality (privacy)
Interoperability
Liability
Scalability/extensibility
Previous slide
Next slide
Back to first slide
View graphic version