In section 2 we have seen that applications demand various levels of security as well as different security properties. We have established a list of security capabilities of SMIF that are fully supported. Sections 5 to 7 explain how to use the SMIF basic building blocks to achieve any combination of security requirements.
The security requirements we address in SMIF are: confidentiality, privacy of sender and receiver/subscriber, source integrity, authentication of the sender, non-repudiation and sender authorization.