Our objective in this article is to investigate the feasibility of defining a methodology for the design of network security. Al- though clearly the problem-centered approach can be achieved by defining separate requirements and implementation phas- es, it is not so clear that a step-by-step “cookbook” approach is feasible. For example, it may be that selection of underlying se- curity mechanisms and design of protocols using these mecha- nisms are so intertwined that they cannot be treated separately. Nevertheless, we attempt to do so. We hope .