A method, system, apparatus, or computer program product is presented for
securing computational resources in a data processing system. A first
user uses a first computational device, and a user security level is
associated with the first user. Likewise, a second user uses a second
computational device, and a user security level is associated with the
second user. The computational resources on the first computational
device are automatically reconfigured based on the second user security
level of the second user. A computational security level may be assigned
to a computational resource on the first computational device, and the
computational security level is dynamically adjusted in response to
detected network activity by the second computational device that is
being used by the second user. Modified security-related parameters for
reconfiguring computational resources on the first computational device
are reconfigured based on the adjusted computational security level.