ContentsCompositor securityConditional AccessMultiuserMultiuser transactional switchingPermissionsRobustnessSecuritySharing