A method of securing communication between a first party and a second
party includes defining a criteria for selecting one of a plurality of
different security methods. One of the plurality of different security
methods is selected in accordance with the defined criteria.