. "The network and other infrastructure elements have the power to enact security, but they do not know the application's context." . . .