§Data protection
□Facilitate
secure exchange of data
§Facilitate trust
□With and
between System Users
□Revoke
trust credentials when necessary
§Authorization
□Manage
who can do what
□Verify
□Identify
misbehavior and allow System Users to provide
misbehavior input