... SSA, TEA, and ASA. The first agent, SSA, maintains a da-tabase of information about ABs. This information is used for encrypting and decrypting sensitive data and metadata included in ABs. ... and metadata, including access control and dissemination control metadata. ABC constructs an AB by putting together data, metadata, and adding a virtual machine. After this stage, the AB becomes ... components (de-tails available in [11], [12]): (a) provenance metadata; (b) integrity check metadata; (c) access control metadata; (d) dissemination control metadata; (e) life duration value; (f)...