In mail, the program relies around the IMAP and SMTP protocols which might be standardized and nicely described. Within the secure enclave we parse all incoming and outgoing request (to and from the Delegatee) and compare them from accessibility policy defined with the credential proprietor. look at, as being a concrete scenario, the organizer of a