Resources:

Resources are a critical element of ISCS security. They are a combination of a Server, a Service and any protocol specific options. The identification of a Resource as an object separate from Servers and Services reflects the real world flow of information and is one of the primary reasons for ISCS's extraordinary efficiency. Resources can override the IP address, NAT and Public TTL settings of their servers. They can also use a different service when accessed publicly, e.g., a web server which is internally operating on port 8080 but advertises port 80 to the world.