next up previous contents
Next: 4.2.8 What is available Up: 4.2 Application developer Previous: 4.2.6 How to come

4.2.7 ../images/blueball.gifHow does a security-aware application specify the use of a specific algorithms for supporting communication confidentiality and integrity?

 

Konstantin Beznosov
(November, 1998): Currently, there is no a standard way for a security-aware application to specify specific QoP algorithms. However, the OMG technical committee issued ``Quality of Protection Management and Control'' Request For Proposal on November 13, 1998, to address exactly this problem.