Techniques are provided for
processing data. Connections having different
security properties are stored, wherein each of the connections allows applications at the
client computer to access data sources at a
server computer. A request is received from an application to access a
data source, wherein the request has associated
security properties. In response to the
client computer requesting establishment of a connection on behalf of the application, it is determined whether there is a stored connection that used a same set of
security properties as are associated with the request from the application and that connected to the
data source that the application requests access to. In response to determining that there is a stored connection that used the same set of security properties and that connected to the
data source, the connection and an associated
client encryption seed, client
encryption token,
server encryption seed, and
server encryption token are re-used. In response to determining that there is not a connection that used the same set of security properties and that connected to the data source, a new client connection key, client encryption seed, client encryption token, sever connection key, server encryption seed, and server encryption token are generated.