A content management system integrated with a web caching proxy that
delivers content according to access control rules. An access control
token is generated using a secret key when a user selects a desired
object (to be provided only upon token validation, thus the object
retrieval and delivery task can be delegated). However, tokens for other
content and/or for other users could be generated by a rogue resource
manager. If the desired object is already cached, the proxy asks the
resource manager to validate the token and then selectively provides the
desired object without contacting a library server. Alternately, the
proxy itself performs the token validation, but must coordinate with the
library server to ensure it has the latest secret key. Finally, the
tokens may contain digital signatures generated with a private key and
validated with a corresponding public key, so that private keys need not
be distributed.