What can MAC offer?
-
Processing pipeline guarantees
- Ensure that data is processed as required
- Split processing into small, minimally trusted stages
- Encryption, sanitization, virus scanning
-
Authorization limits for legitimate users
- Decompose administrator role
- Partition users into classes based on position, clearance,
etc.