[Next]
[Up]
[Previous]
[Contents]
Next: 4.2.8 What is available
Up: 4.2 Application developer
Previous: 4.2.6 [IMAGE ]How to
4.2.7 [IMAGE ]How does a security-aware application specify the use of a specific
algorithms for supporting communication confidentiality and integrity?
- Konstantin Beznosov
- (November, 1998): Currently, there is no a standard way
for a security-aware application to specify specific QoP algorithms. However,
the OMG technical committee issued ``Quality of Protection Management and Control'' Request For Proposal
on
November 13, 1998, to address exactly this problem.