Security Requirements (cont.)
Authentication
- Establish the identity of intervening parties
Auditing
- Keep a trace of what happened
- Alert in case of intrusion detection
Authorization
- Ensure a permission-based environment, enforce strict encapsulation of capabilities and responsibilities