… ing IT system designs that delivers functionality through loosely coupled and independent com- ponents, in contrast to the tight integration found in most existing systems. Although the … and it could actually choose whichever method is relevant based on context. It might also contact other services, for example, a service that validates a PKI certifi cate in fulfi lling … combinations needs to be shielded. • Detailed access policies might be needed to com- ply with privacy restrictions, for example, when user attribute sets contain personal …