As companies migrate from a centralized to a distributed computing environment, the administration and management of security policies, in particular authorization policies, is becoming an increasingly difficult task. This paper considers the design of an authorization system that is suitable for distributed applications. It discusses the architectural design principles, describes the construct...