next up previous contents
Next: 3.1.4.1 Authentication Up: 3.1 Interactions in adaptive Previous: 3.1.3 Security management service

  
3.1.4 Provision of security management services

Clearly the security management service will have to interact with the various peripheral applications for policy definition and logging purposes, and for gathering information and taking action. These interactions are discussed in the according paragraphs from chapter 2. We will now focus on how the various security services as defined in paragraph 2.1.6 can be provided through interaction with the central security management service.



 

(c) 1998, Filip Schepers