- • Data is much less vulnerable even if leaked
- • Reduced likelihood of problems with failures in policy
- • Moderate combinations of AC restrictions and data encryption/manipulation require much less effort than extensive access control schemes and offer much greater security
- • Reduced risk