Towards an authentication model
access control must be flexible; managed
must reflect degrees of indirection in real-world contractual relationships, e.g.
- publisher <=> content aggregator
- content aggregator <=> library
- library <=> user
resource compendium and user attributes database are key components