A secure network architecture method and apparatus that provides security
at all levels of the network. The system and method of the present
invention provides communications profiles for all network resources that
uniquely identify the individual network resources and provide for
absolute object identity. Communications over the network are managed at
all levels by the network resources themselves by virtue of individual
communications profiles that are policed by arbitrators and network
resources alike.