. . "There is a problem of minimizing the authorization operation for each request and operation that is performed by a user, while still maintaining a secure distributed processing environment." . . .