n Provide usage scenarios (with focus security ) for DAML-S
n Separation of concern: policy vs enforcement
l Provide challenge examples of policies (e.g., access control to
service, interaction with authenticated clients)
l And their enforcement (e.g., Kerberos as authentication service)
l Same for trust/privacy
n Provide reasoning mechanism for selected security policies
n Integration of role-based, capability-based, ACL models in
existing security ontologies
n Describe core security related services
l E.g., authentication/authorization service, encryption service,  policy
compatibility checking service