The Phase II effort will model TECSEC's Information Object Oriented Cryptography within a network architecture for the management of media storage protection as well as for protecting information exchange. During the course of the implementation and analysis, a merger of various security features and cryptographic key management techniques will form the essence of a highly trusted security model for workstations in a network applicable across two operating systems. In addition to the model, the effort will address the impact of Object Oriented key management upon a defined operational scenerio and upon security personnel such as the COMSEC custodian. Current efforts to secure information are designed to prohibit access to information (i.e. compromise), to prohibit modification of data, or to defend against denial of service. By using new key management tools, the above efforts may be expanded to offer flexibility and a more free flowing information environment.