ABSTRACT
In the course of the project the methods applied lead to the fact that it is required to utilize
a) a service that authenticates machines reliably
b) requires a firewall friendly protocol that is ISO/IEC 20922
c) that any architecture needs to be evaluated according to security and safety methods.