The document discusses the use of public key infrastructure (PKI) to establish secure and flexible authorization policies in distributed computing environments. It emphasizes the necessity of digitally signed certificates for user identity, capability tokens for access control, and the importance of usability for stakeholders in generating and managing policy constraints. The authors propose the Akenti authorization model which provides a way to handle access decisions and includes recommendations for future developments in certification and trust models.