In distributed systems users often need to share sensitive data with other usersbased on the latter's ability to satisfy various policies. In many cases the data ownermay not even know the identities of the data recipients, but deems it crucial that theyare legitimate; i.e., satisfy the policy....