Return to Article Details Using new technologies to organize a secure flow of information Download Download PDF