ID, Certificate, Login,
Delegation Token
Authentication,
Encryption
Signatures
Permissions,
Obligations
Credential
Security Technique
Deontic Concepts
Policies
- Delegation Rules
- Authorization Rules
- Data Protection Rules
Agents, Actions
High-level language
logic, inference