This section of the paper describes each of the methods for changing the security policy in greater detail along with the capabilities and limitations presented by each. However, we begin by describing the criteria against which the four implementation methods are evaluated in Section 5.1. The methods themselves are described in Sections 5.2 through 5.5