1) 1.Uniquely identifies and authenticates source and destination domains for information transfer. 2.Binds security attributes to information to facilitate information flow policy enforcement. 3.Tracks problems associated with the security attribute binding and information transfer. 4.Separates duties of individuals as necessary, to prevent malevolent activity without collusion 5.Documents separation of duties. 6.Implements separation of duties through assigned information system access authorizations. 7.Allows users to specify and control sharing by named individuals or groups of individuals, or by both; 8.Limits propagation of access rights 9.Includes or excludes access to the granularity of a single user. Solution 1) 1.Uniquely identifies and authenticates source and destination domains for information transfer. 2.Binds security attributes to information to facilitate information flow policy enforcement. 3.Tracks problems associated with the security attribute binding and information transfer. 4.Separates duties of individuals as necessary, to prevent malevolent activity without collusion 5.Documents separation of duties. 6.Implements separation of duties through assigned information system access authorizations. 7.Allows users to specify and control sharing by named individuals or groups of individuals, or by both; 8.Limits propagation of access rights 9.Includes or excludes access to the granularity of a single user..