<< Previous << [Session1 Index] >> Next >>
We will organize this security discussion around the following topics: requirements, problems, the solution model, and the Java Virtual Machine Implementation of that model using the E programming language.
Let's begin with the Requirements.