 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
| q |
Security
mark-up of documents to support decisions:
|
|
|
|
q |
Which (part
of) document/service is accessible to whom?
|
|
|
|
q |
How can this
document being transported (secure channel, bandwith,
|
|
etc)?
|
|
|
| q |
Reasoning
about security
|
|
|
|
q |
What can a
device do/not do?
|
|
|
|
q |
Can I trust
the results of the computing system?
|
|
|
| q |
Basis for
enforcing security requirements and policies
|
|
|
| q |
Clarity of
representation of security requirements
|
|
|
| q |
Enables
negotiation, supports decision making and conflict
|
|
|
resolution,
support an agent in retrieving the “right” items
|
|