An alternative approach [to user-level access control lists] is to separate authentication … not to honor a request). In such a … set of authorizations I should have. These authorizations … I have an explicit set of authorizations, I … the access-control mechanism need not concern itself with … deny access [according to my authorizations]. Doing things this way allows … introduced without modifying existing systems.
Google-1
Google-2
Copyright clearance needed for quotation.