The Requirements
Encapsulation
Unforgeable references
Target authentication
Private communication