A system and method that allows a page (e.g., Internet content) author to
associate a set of security settings on any desired element (e.g., tag)
of the page. When the page is interpreted, each element is handled based
on its associated security settings, allowing a page author to request
that any element be considered differently with respect to security than
other elements, and/or differently relative to the page that contains it.
A negotiator determines the actual settings for elements to ensure that
security cannot be compromised by tagging an element such that it has the
ability to do more than desired. The negotiator also determines the
settings for elements that do not have specifically associated security
data, e.g., elements without specified security settings may inherit
security settings from higher elements, or the top-level container. The
settings may correspond to those of a security zone.