Selecting Security Mechanisms in Secure Tropos