What are the design principles underlying the Component based software

  2. You have been asked to design a secure system that requires strong authentication and authorization. The system must be designed so that communications between parts of the system cannot be intercepted and read by an attacker. Suggest the most appropriate client–server architecture for this system and, giving the reasons for your answer, propose how  functionality should be distributed between the client and the server systems. [Hint : Chapter 17]  

Leave a Comment

Your email address will not be published.