Methods and apparatus, including computer program products, for
controlling access to an electronic document. A document management
system receives a request from a first user at a first user location for
an electronic document. The first user is authenticated using a set of
access policies for the electronic document, to verify that the first
user is authorized to obtain the electronic document. If so, an encrypted
rendition is passed to the first user. A request for access to the
encrypted rendition from a second user is then received. The second user
is authenticated, using the set of access policies, to establish which
operations the second user may perform on the encrypted rendition. A
voucher including an electronic key for decrypting the encrypted
rendition and the set of access policies is created at the document
management system. The voucher is passed to the second user location.