{Network architectures or network communication protocols for network security for controlling access to network resources when the policy decisions are valid for a limited amount of time}