Next: Selecting a Change Detector Up: Selecting the Right Tool Previous: Selecting a General Purpose

Selecting an Access Control Shell

Access control shells may be implemented in software or as hybrid packages with both hardware and software components. If encryption modules are required, they can be designed as software or hardware. The following questions should be considered when selecting an access control shell:


konczal@csrc.ncsl.nist.gov
Fri Mar 11 21:26:02 EST 1994