A functional approach to authorization, part 2| fsharpforfunandprofit.com
Capability based security and more| fsharpforfunandprofit.com