q Security mark-up of documents to support decisions:
q Which (part of) document/service is accessible to whom?
q How can this document being transported (secure channel, bandwith,
etc)?
q Reasoning about security
q What can a device do/not do?
q Can I trust the results of the computing system?
q Basis for enforcing security requirements and policies
q Clarity of representation of security requirements
q Enables negotiation, supports decision making and conflict
resolution, support an agent in retrieving the “right” items