1. Discuss four access methods, giving the weaknesses of each.
2. Discuss the many ways in which access can be abused.
3. Is it possible to implement full distributed authorization? What will be involved?
4. Web authorization is central to the security of all Web applications. What is the best way to safeguard all Web applications and at the same time make Web access reliable and fast?