Flexibility

Performance

Trust

Ease of Use

Scalability

Compatibility

Access Control Predicates

What Really Happens In B

Mandatory Security

Authorization

Key Distribution

Firewalls?