For a distributed system with many computers to support self-protecting data,
we must design new hardware and software mechanisms that enable the persistent binding of the data with its associated security policy and enforce this throughout the lifetime of the data
whenever it is accessed and on any computer, including mobile devices. However, this presents multiple challenges.