Diapositive 14 sur 21
Commentaires:
The same mechanism as used in a financial transaction to identify users and applications can be used in the network infrastructure to identify sides, users and Endsystems.