The security techniques that are used within a TLEX ecosystem. These techniques are based on the concepts of: