Check out the new USENIX Web site. next up previous
Next: Secure telecommunications using Plasma Up: Media and structure specific Previous: What further modules are

How are the modules activated?

The generic security services module could be activated by user activity or alternatively, they might get activated sequentially. The module cryptographic protocols must interact with the underlying security technology which provides the actual implementation of the cryptographic algorithms. The medium module obtains its data from the Filter and differentiate the data stream into several classes. The security policy can be set directly by the user or by a security administrator.



Annette Krannig
11/20/1997