ABSTRACT

In the course of the project the methods applied lead to the fact that it is required to utilize

a) a service that authenticates machines reliably

b) requires a firewall friendly protocol that is ISO/IEC 20922

c) that any architecture needs to be evaluated according to security and safety methods.