Enable the construction of virus-free, tamper-free systems
Authentication techniques: Base on public-key encryption
Changes the semantics of pointers
Suitable for use in networked/distributed environments