A Transaction Authorization Method operating over a computer network
comprising a plurality of interconnected computers and a plurality of
resources, each computer including a processor, memory and input/output
devices, each resource operatively coupled to at least one of the
computers and executing at least one of the activities in the process
flow, the method characterized in that it assembles an electronic
authorization of a transaction in a manner which is verifiable by
extracting and verifying whether role certificates of at least one type,
associated with the authorization, are themselves authentic. The method
eliminates the need of having to authorize each and every signature on a
transaction individually by providing an authorization structure based on
roles, this structure being accessible on a public network for
verification that the transaction is authorized.