Dynamic Security Constraints