Techniques are provided for allocating resources over a network. A
resource consumer requests access to a resource over a network. As part
of that request, the resource consumer acquires information that permits
it to securely communicate with a resource provider. The resource
provider controls the resource and once satisfied with the security of a
request from a resource consumer allocates the resource for access by the
resource consumer.