Although Table 2 depicts an embodiment in which the resources that are available are application programs, a similar technique may be used for computing environments and other resources.To obtain the information that is stored in the resource authorization cache 448, the remote machine 30 obtains the resource-related information from each other machine in the machine farm 38 regarding the resource