q What do you want to show? What is the value added by DAML
security?
q Suggestion:
q Networked environment
q Wireless environment (ubiquitous computing)
q JBI
q Ultralog
q Homeland defense
q Benchmarks: Apply ontologies to express PGP, Role-Based
Access Control