Table I:
Security requirements