3.3.1.5.2 Building and Using a Security Context