Techniques for providing application layer security may be facilitated by
an arbitrator. In general, in one implementation, an arbitrator may
receive a security tender including security requirements for an
application, search for security services to fulfill the security
requirements, determine whether discovered security services can satisfy
the security requirements, and, if security services that can satisfy the
security requirements exist, generate a security contract for the
application, the security contract specifying how the application is to
communicate with the security services that can satisfy the security
requirements.