id sid tid token lemma pos ft848p60v2w 1 1 the the DET ft848p60v2w 1 2 operation operation NOUN ft848p60v2w 1 3 of of ADP ft848p60v2w 1 4 modern modern ADJ ft848p60v2w 1 5 security security NOUN ft848p60v2w 1 6 systems system NOUN ft848p60v2w 1 7 demands demand VERB ft848p60v2w 1 8 too too ADV ft848p60v2w 1 9 much much ADJ ft848p60v2w 1 10 sophistication sophistication NOUN ft848p60v2w 1 11 from from ADP ft848p60v2w 1 12 the the DET ft848p60v2w 1 13 average average ADJ ft848p60v2w 1 14 user user NOUN ft848p60v2w 1 15 . . PUNCT ft848p60v2w 2 1 further far ADV ft848p60v2w 2 2 , , PUNCT ft848p60v2w 2 3 in in ADP ft848p60v2w 2 4 the the DET ft848p60v2w 2 5 face face NOUN ft848p60v2w 2 6 of of ADP ft848p60v2w 2 7 increasingly increasingly ADV ft848p60v2w 2 8 common common ADJ ft848p60v2w 2 9 malware malware NOUN ft848p60v2w 2 10 and and CCONJ ft848p60v2w 2 11 spyware spyware NOUN ft848p60v2w 2 12 , , PUNCT ft848p60v2w 2 13 users user NOUN ft848p60v2w 2 14 are be AUX ft848p60v2w 2 15 not not PART ft848p60v2w 2 16 empowered empower VERB ft848p60v2w 2 17 to to PART ft848p60v2w 2 18 protect protect VERB ft848p60v2w 2 19 themselves themselves PRON ft848p60v2w 2 20 . . PUNCT ft848p60v2w 3 1 to to PART ft848p60v2w 3 2 address address VERB ft848p60v2w 3 3 these these DET ft848p60v2w 3 4 issues issue NOUN ft848p60v2w 3 5 , , PUNCT ft848p60v2w 3 6 i i PRON ft848p60v2w 3 7 propose propose VERB ft848p60v2w 3 8 sub sub NOUN ft848p60v2w 3 9 - - NOUN ft848p60v2w 3 10 identities identity NOUN ft848p60v2w 3 11 , , PUNCT ft848p60v2w 3 12 a a DET ft848p60v2w 3 13 simple simple ADJ ft848p60v2w 3 14 abstract abstract ADJ ft848p60v2w 3 15 identity identity NOUN ft848p60v2w 3 16 model model NOUN ft848p60v2w 3 17 for for ADP ft848p60v2w 3 18 practical practical ADJ ft848p60v2w 3 19 containment containment NOUN ft848p60v2w 3 20 in in ADP ft848p60v2w 3 21 the the DET ft848p60v2w 3 22 operating operating NOUN ft848p60v2w 3 23 system system NOUN ft848p60v2w 3 24 . . PUNCT ft848p60v2w 4 1 in in ADP ft848p60v2w 4 2 this this DET ft848p60v2w 4 3 model model NOUN ft848p60v2w 4 4 , , PUNCT ft848p60v2w 4 5 user user NOUN ft848p60v2w 4 6 identities identity NOUN ft848p60v2w 4 7 form form VERB ft848p60v2w 4 8 a a DET ft848p60v2w 4 9 hierarchy hierarchy NOUN ft848p60v2w 4 10 , , PUNCT ft848p60v2w 4 11 and and CCONJ ft848p60v2w 4 12 each each DET ft848p60v2w 4 13 user user NOUN ft848p60v2w 4 14 may may AUX ft848p60v2w 4 15 create create VERB ft848p60v2w 4 16 sub sub NOUN ft848p60v2w 4 17 - - NOUN ft848p60v2w 4 18 identities identity NOUN ft848p60v2w 4 19 at at ADP ft848p60v2w 4 20 any any DET ft848p60v2w 4 21 time time NOUN ft848p60v2w 4 22 without without ADP ft848p60v2w 4 23 the the DET ft848p60v2w 4 24 help help NOUN ft848p60v2w 4 25 or or CCONJ ft848p60v2w 4 26 approval approval NOUN ft848p60v2w 4 27 of of ADP ft848p60v2w 4 28 an an DET ft848p60v2w 4 29 administrator administrator NOUN ft848p60v2w 4 30 . . PUNCT ft848p60v2w 5 1 while while SCONJ ft848p60v2w 5 2 this this DET ft848p60v2w 5 3 model model NOUN ft848p60v2w 5 4 does do AUX ft848p60v2w 5 5 not not PART ft848p60v2w 5 6 provide provide VERB ft848p60v2w 5 7 the the DET ft848p60v2w 5 8 fine fine ADV ft848p60v2w 5 9 - - PUNCT ft848p60v2w 5 10 grained grain VERB ft848p60v2w 5 11 security security NOUN ft848p60v2w 5 12 available available ADJ ft848p60v2w 5 13 with with ADP ft848p60v2w 5 14 more more ADV ft848p60v2w 5 15 intrusive intrusive ADJ ft848p60v2w 5 16 or or CCONJ ft848p60v2w 5 17 comprehensive comprehensive ADJ ft848p60v2w 5 18 systems system NOUN ft848p60v2w 5 19 , , PUNCT ft848p60v2w 5 20 it it PRON ft848p60v2w 5 21 provides provide VERB ft848p60v2w 5 22 a a DET ft848p60v2w 5 23 significant significant ADJ ft848p60v2w 5 24 measure measure NOUN ft848p60v2w 5 25 of of ADP ft848p60v2w 5 26 drop drop VERB ft848p60v2w 5 27 - - PUNCT ft848p60v2w 5 28 in in ADP ft848p60v2w 5 29 security security NOUN ft848p60v2w 5 30 that that PRON ft848p60v2w 5 31 is be AUX ft848p60v2w 5 32 more more ADV ft848p60v2w 5 33 accessible accessible ADJ ft848p60v2w 5 34 to to ADP ft848p60v2w 5 35 the the DET ft848p60v2w 5 36 average average ADJ ft848p60v2w 5 37 user user NOUN ft848p60v2w 5 38 . . PUNCT ft848p60v2w 6 1 in in ADP ft848p60v2w 6 2 this this DET ft848p60v2w 6 3 work work NOUN ft848p60v2w 6 4 , , PUNCT ft848p60v2w 6 5 i i PRON ft848p60v2w 6 6 demonstrate demonstrate VERB ft848p60v2w 6 7 an an DET ft848p60v2w 6 8 implementation implementation NOUN ft848p60v2w 6 9 of of ADP ft848p60v2w 6 10 the the DET ft848p60v2w 6 11 abstract abstract ADJ ft848p60v2w 6 12 model model NOUN ft848p60v2w 6 13 of of ADP ft848p60v2w 6 14 sub sub NOUN ft848p60v2w 6 15 - - NOUN ft848p60v2w 6 16 identity identity NOUN ft848p60v2w 6 17 in in ADP ft848p60v2w 6 18 the the DET ft848p60v2w 6 19 form form NOUN ft848p60v2w 6 20 of of ADP ft848p60v2w 6 21 a a DET ft848p60v2w 6 22 user user NOUN ft848p60v2w 6 23 - - PUNCT ft848p60v2w 6 24 space space NOUN ft848p60v2w 6 25 toolkit toolkit NOUN ft848p60v2w 6 26 , , PUNCT ft848p60v2w 6 27 pluggable pluggable ADJ ft848p60v2w 6 28 authentication authentication NOUN ft848p60v2w 6 29 module module NOUN ft848p60v2w 6 30 , , PUNCT ft848p60v2w 6 31 and and CCONJ ft848p60v2w 6 32 user user NOUN ft848p60v2w 6 33 - - PUNCT ft848p60v2w 6 34 space space NOUN ft848p60v2w 6 35 filesystem filesystem NOUN ft848p60v2w 6 36 , , PUNCT ft848p60v2w 6 37 as as ADV ft848p60v2w 6 38 well well ADV ft848p60v2w 6 39 as as ADP ft848p60v2w 6 40 several several ADJ ft848p60v2w 6 41 applications application NOUN ft848p60v2w 6 42 of of ADP ft848p60v2w 6 43 sub sub NOUN ft848p60v2w 6 44 - - NOUN ft848p60v2w 6 45 identity identity NOUN ft848p60v2w 6 46 and and CCONJ ft848p60v2w 6 47 a a DET ft848p60v2w 6 48 continuum continuum NOUN ft848p60v2w 6 49 of of ADP ft848p60v2w 6 50 disciplines discipline NOUN ft848p60v2w 6 51 for for ADP ft848p60v2w 6 52 using use VERB ft848p60v2w 6 53 sub sub NOUN ft848p60v2w 6 54 - - NOUN ft848p60v2w 6 55 identity identity NOUN ft848p60v2w 6 56 . . PUNCT