}Data protection
◦Facilitate secure exchange of data
}Facilitate trust
◦With and between System Users
◦Revoke trust credentials when necessary
}Authorization
◦Manage who can do what
◦Verify
◦Identify misbehavior and allow System Users to provide misbehavior input
35
5/17/2011