We study some of the concepts, protocols, and algorithms for access co
ntrol in distributed systems, from a logical perspective. We account f
or how a principal may come to believe that another principal is makin
g a request, either on his own or on someone else's behalf. We also pr
ovide a logical language for access control lists and theories for dec
iding whether requests should be granted.