Access Control: Role/Identity based

89. Policy Enforcement
90. Policy Definition Problems
91. Identity based vs. code based policies
92. Code Signing