Briefly discuss security requirements for such a system. Outline a security architecture that could achieve the specified security goals in your system. You must include in your discussion of the security limitations of your approach.