¨Allow replication across untrusted
mirrors, but guarantee corruption detection
¨Ensure that modifications can only
be made by parties with valid crypto keys
¨Ensure that for every mod there is
an audit trail, so if key is compromised we know where to
look
¨Support development groups that span
companies
and administrative boundaries