A functional approach to authorization, part 3| fsharpforfunandprofit.com
Capability based security and more| fsharpforfunandprofit.com