[Next] [Up] [Previous] [Contents]
Next: 4.2.8 What is available Up: 4.2 Application developer Previous: 4.2.6 [IMAGE ]How to

4.2.7 [IMAGE ]How does a security-aware application specify the use of a specific algorithms for supporting communication confidentiality and integrity?

 

Konstantin Beznosov
(November, 1998): Currently, there is no a standard way for a security-aware application to specify specific QoP algorithms. However, the OMG technical committee issued ``Quality of Protection Management and Control'' Request For Proposal on November 13, 1998, to address exactly this problem.