Merge "vdl/js: Add serverCall to the generated stub."
diff --git a/cmd/gclogs/doc.go b/cmd/gclogs/doc.go
index 4a7e9a0..adffadf 100644
--- a/cmd/gclogs/doc.go
+++ b/cmd/gclogs/doc.go
@@ -54,9 +54,9 @@
  -v23.namespace.root=[/(dev.v.io/role/vprod/service/mounttabled)@ns.dev.v.io:8101]
    local namespace root; can be repeated to provided multiple roots
  -v23.permissions.file=map[]
-   specify an acl file as <name>:<aclfile>
+   specify a perms file as <name>:<permsfile>
  -v23.permissions.literal=
-   explicitly specify the runtime acl as a JSON-encoded access.Permissions.
+   explicitly specify the runtime perms as a JSON-encoded access.Permissions.
    Overrides all --v23.permissions.file flags.
  -v23.proxy=
    object name of proxy service to use to export services across network
diff --git a/cmd/principal/doc.go b/cmd/principal/doc.go
index 9ffcd6d..6ce390d 100644
--- a/cmd/principal/doc.go
+++ b/cmd/principal/doc.go
@@ -53,9 +53,9 @@
  -v23.namespace.root=[/(dev.v.io/role/vprod/service/mounttabled)@ns.dev.v.io:8101]
    local namespace root; can be repeated to provided multiple roots
  -v23.permissions.file=map[]
-   specify an acl file as <name>:<aclfile>
+   specify a perms file as <name>:<permsfile>
  -v23.permissions.literal=
-   explicitly specify the runtime acl as a JSON-encoded access.Permissions.
+   explicitly specify the runtime perms as a JSON-encoded access.Permissions.
    Overrides all --v23.permissions.file flags.
  -v23.proxy=
    object name of proxy service to use to export services across network
diff --git a/cmd/uniqueid/doc.go b/cmd/uniqueid/doc.go
index 485ad1a..c494452 100644
--- a/cmd/uniqueid/doc.go
+++ b/cmd/uniqueid/doc.go
@@ -40,9 +40,9 @@
  -v23.namespace.root=[/(dev.v.io/role/vprod/service/mounttabled)@ns.dev.v.io:8101]
    local namespace root; can be repeated to provided multiple roots
  -v23.permissions.file=map[]
-   specify an acl file as <name>:<aclfile>
+   specify a perms file as <name>:<permsfile>
  -v23.permissions.literal=
-   explicitly specify the runtime acl as a JSON-encoded access.Permissions.
+   explicitly specify the runtime perms as a JSON-encoded access.Permissions.
    Overrides all --v23.permissions.file flags.
  -v23.proxy=
    object name of proxy service to use to export services across network
diff --git a/cmd/vom/doc.go b/cmd/vom/doc.go
index ca40374..b25adef 100644
--- a/cmd/vom/doc.go
+++ b/cmd/vom/doc.go
@@ -39,9 +39,9 @@
  -v23.namespace.root=[/(dev.v.io/role/vprod/service/mounttabled)@ns.dev.v.io:8101]
    local namespace root; can be repeated to provided multiple roots
  -v23.permissions.file=map[]
-   specify an acl file as <name>:<aclfile>
+   specify a perms file as <name>:<permsfile>
  -v23.permissions.literal=
-   explicitly specify the runtime acl as a JSON-encoded access.Permissions.
+   explicitly specify the runtime perms as a JSON-encoded access.Permissions.
    Overrides all --v23.permissions.file flags.
  -v23.proxy=
    object name of proxy service to use to export services across network
diff --git a/cmd/vomtestgen/doc.go b/cmd/vomtestgen/doc.go
index 656f9ff..1d9e7af 100644
--- a/cmd/vomtestgen/doc.go
+++ b/cmd/vomtestgen/doc.go
@@ -55,9 +55,9 @@
  -v23.namespace.root=[/(dev.v.io/role/vprod/service/mounttabled)@ns.dev.v.io:8101]
    local namespace root; can be repeated to provided multiple roots
  -v23.permissions.file=map[]
-   specify an acl file as <name>:<aclfile>
+   specify a perms file as <name>:<permsfile>
  -v23.permissions.literal=
-   explicitly specify the runtime acl as a JSON-encoded access.Permissions.
+   explicitly specify the runtime perms as a JSON-encoded access.Permissions.
    Overrides all --v23.permissions.file flags.
  -v23.proxy=
    object name of proxy service to use to export services across network
diff --git a/examples/rps/rpsbot/main.go b/examples/rps/rpsbot/main.go
index 120f109..cae0b2f 100644
--- a/examples/rps/rpsbot/main.go
+++ b/examples/rps/rpsbot/main.go
@@ -25,16 +25,16 @@
 )
 
 var (
-	name     = flag.String("name", "", "identifier to publish itself as (defaults to user@hostname)")
-	numGames = flag.Int("num-games", -1, "number of games to play (-1 means unlimited)")
-	aclFile  = flag.String("acl-file", "", "file containing the JSON-encoded ACL")
+	name      = flag.String("name", "", "identifier to publish itself as (defaults to user@hostname)")
+	numGames  = flag.Int("num-games", -1, "number of games to play (-1 means unlimited)")
+	permsFile = flag.String("acl-file", "", "file containing the JSON-encoded Permissions")
 )
 
 func main() {
 	ctx, shutdown := v23.Init()
 	defer shutdown()
 
-	auth := internal.NewAuthorizer(*aclFile)
+	auth := internal.NewAuthorizer(*permsFile)
 	server, err := v23.NewServer(ctx)
 	if err != nil {
 		vlog.Fatalf("NewServer failed: %v", err)
diff --git a/examples/rps/rpsplayer/main.go b/examples/rps/rpsplayer/main.go
index 2c01ee7..cb01ff4 100644
--- a/examples/rps/rpsplayer/main.go
+++ b/examples/rps/rpsplayer/main.go
@@ -29,8 +29,8 @@
 )
 
 var (
-	name    = flag.String("name", "", "identifier to publish itself as (defaults to user@hostname)")
-	aclFile = flag.String("acl-file", "", "file containing the JSON-encoded ACL")
+	name      = flag.String("name", "", "identifier to publish itself as (defaults to user@hostname)")
+	permsFile = flag.String("acl-file", "", "file containing the JSON-encoded Permissions")
 )
 
 func main() {
@@ -122,7 +122,7 @@
 	if *name == "" {
 		*name = internal.CreateName()
 	}
-	if err := server.Serve(fmt.Sprintf("rps/player/%s", *name), rps.PlayerServer(&impl{ch: ch}), internal.NewAuthorizer(*aclFile)); err != nil {
+	if err := server.Serve(fmt.Sprintf("rps/player/%s", *name), rps.PlayerServer(&impl{ch: ch}), internal.NewAuthorizer(*permsFile)); err != nil {
 		vlog.Fatalf("Serve failed: %v", err)
 	}
 	vlog.Infof("Listening on endpoint /%s", ep)
diff --git a/examples/rps/rpsscorekeeper/main.go b/examples/rps/rpsscorekeeper/main.go
index 3d808da..a70cf21 100644
--- a/examples/rps/rpsscorekeeper/main.go
+++ b/examples/rps/rpsscorekeeper/main.go
@@ -24,7 +24,7 @@
 )
 
 var (
-	aclFile = flag.String("acl-file", "", "file containing the JSON-encoded ACL")
+	permsFile = flag.String("acl-file", "", "file containing the JSON-encoded Permissions")
 )
 
 type impl struct {
@@ -60,7 +60,7 @@
 	if err != nil {
 		vlog.Fatalf("os.Hostname failed: %v", err)
 	}
-	if err := server.Serve(fmt.Sprintf("rps/scorekeeper/%s", hostname), rps.ScoreKeeperServer(rpsService), internal.NewAuthorizer(*aclFile)); err != nil {
+	if err := server.Serve(fmt.Sprintf("rps/scorekeeper/%s", hostname), rps.ScoreKeeperServer(rpsService), internal.NewAuthorizer(*permsFile)); err != nil {
 		vlog.Fatalf("Serve failed: %v", err)
 	}
 	vlog.Infof("Listening on endpoint /%s", ep)
diff --git a/lib/flags/flags.go b/lib/flags/flags.go
index 660b727..d133d1f 100644
--- a/lib/flags/flags.go
+++ b/lib/flags/flags.go
@@ -48,7 +48,7 @@
 	// a JSON-encoded representation of the Permissions type defined in the
 	// VDL package v.io/v23/security/access
 	// -v23.permissions.literal
-	AccessList
+	Permissions
 )
 
 var (
@@ -96,27 +96,27 @@
 	return nil
 }
 
-type aclFlagVar struct {
+type permsFlagVar struct {
 	isSet bool
 	files map[string]string
 }
 
-func (aclf *aclFlagVar) String() string {
-	return fmt.Sprintf("%v", aclf.files)
+func (permsf *permsFlagVar) String() string {
+	return fmt.Sprintf("%v", permsf.files)
 }
 
-func (aclf *aclFlagVar) Set(v string) error {
-	if !aclf.isSet {
+func (permsf *permsFlagVar) Set(v string) error {
+	if !permsf.isSet {
 		// override the default value
-		aclf.isSet = true
-		aclf.files = make(map[string]string)
+		permsf.isSet = true
+		permsf.files = make(map[string]string)
 	}
 	parts := strings.SplitN(v, ":", 2)
 	if len(parts) != 2 {
 		return verror.New(errNotNameColonFile, nil, v)
 	}
 	name, file := parts[0], parts[1]
-	aclf.files[name] = file
+	permsf.files[name] = file
 	return nil
 }
 
@@ -161,22 +161,22 @@
 	CollectRegexp string
 }
 
-// AccessListFlags contains the values of the AccessListFlags flag group.
-type AccessListFlags struct {
-	// List of named AccessList files.
-	fileFlag aclFlagVar
+// PermissionsFlags contains the values of the PermissionsFlags flag group.
+type PermissionsFlags struct {
+	// List of named Permissions files.
+	fileFlag permsFlagVar
 
 	// Single json string, overrides everything.
 	literal string
 }
 
-// AccessListFile returns the file which is presumed to contain AccessList information
-// associated with the supplied name parameter.
-func (af AccessListFlags) AccessListFile(name string) string {
+// PermissionsFile returns the file which is presumed to contain Permissions
+// information associated with the supplied name parameter.
+func (af PermissionsFlags) PermissionsFile(name string) string {
 	return af.fileFlag.files[name]
 }
 
-func (af AccessListFlags) AccessListLiteral() string {
+func (af PermissionsFlags) PermissionsLiteral() string {
 	return af.literal
 }
 
@@ -286,10 +286,10 @@
 	return f
 }
 
-func createAndRegisterAccessListFlags(fs *flag.FlagSet) *AccessListFlags {
-	f := &AccessListFlags{}
-	fs.Var(&f.fileFlag, "v23.permissions.file", "specify an acl file as <name>:<aclfile>")
-	fs.StringVar(&f.literal, "v23.permissions.literal", "", "explicitly specify the runtime acl as a JSON-encoded access.Permissions. Overrides all --v23.permissions.file flags.")
+func createAndRegisterPermissionsFlags(fs *flag.FlagSet) *PermissionsFlags {
+	f := &PermissionsFlags{}
+	fs.Var(&f.fileFlag, "v23.permissions.file", "specify a perms file as <name>:<permsfile>")
+	fs.StringVar(&f.literal, "v23.permissions.literal", "", "explicitly specify the runtime perms as a JSON-encoded access.Permissions. Overrides all --v23.permissions.file flags.")
 	return f
 }
 
@@ -363,8 +363,8 @@
 			f.groups[Runtime] = createAndRegisterRuntimeFlags(fs)
 		case Listen:
 			f.groups[Listen] = createAndRegisterListenFlags(fs)
-		case AccessList:
-			f.groups[AccessList] = createAndRegisterAccessListFlags(fs)
+		case Permissions:
+			f.groups[Permissions] = createAndRegisterPermissionsFlags(fs)
 		}
 	}
 	return f
@@ -422,15 +422,15 @@
 	return ListenFlags{}
 }
 
-// AccessListFlags returns a copy of the AccessList flag group stored in Flags.
-// This copy will contain default values if the AccessList flag group
-// was not specified when CreateAndRegister was called. The HasGroup
-// method can be used for testing to see if any given group was configured.
-func (f *Flags) AccessListFlags() AccessListFlags {
-	if p := f.groups[AccessList]; p != nil {
-		return *(p.(*AccessListFlags))
+// PermissionsFlags returns a copy of the Permissions flag group stored in
+// Flags. This copy will contain default values if the Permissions flag group
+// was not specified when CreateAndRegister was called. The HasGroup method can
+// be used for testing to see if any given group was configured.
+func (f *Flags) PermissionsFlags() PermissionsFlags {
+	if p := f.groups[Permissions]; p != nil {
+		return *(p.(*PermissionsFlags))
 	}
-	return AccessListFlags{}
+	return PermissionsFlags{}
 }
 
 // HasGroup returns group if the supplied FlagGroup has been created
diff --git a/lib/flags/flags_test.go b/lib/flags/flags_test.go
index 8909346..b3706f6 100644
--- a/lib/flags/flags_test.go
+++ b/lib/flags/flags_test.go
@@ -46,53 +46,53 @@
 	}
 }
 
-func TestAccessListFlags(t *testing.T) {
+func TestPermissionsFlags(t *testing.T) {
 	fs := flag.NewFlagSet("test", flag.ContinueOnError)
-	fl := flags.CreateAndRegister(fs, flags.Runtime, flags.AccessList)
+	fl := flags.CreateAndRegister(fs, flags.Runtime, flags.Permissions)
 	args := []string{"--v23.permissions.file=runtime:foo.json", "--v23.permissions.file=bar:bar.json", "--v23.permissions.file=baz:bar:baz.json"}
 	fl.Parse(args, nil)
-	aclf := fl.AccessListFlags()
+	permsf := fl.PermissionsFlags()
 
-	if got, want := aclf.AccessListFile("runtime"), "foo.json"; got != want {
+	if got, want := permsf.PermissionsFile("runtime"), "foo.json"; got != want {
 		t.Errorf("got %t, want %t", got, want)
 	}
-	if got, want := aclf.AccessListFile("bar"), "bar.json"; got != want {
+	if got, want := permsf.PermissionsFile("bar"), "bar.json"; got != want {
 		t.Errorf("got %t, want %t", got, want)
 	}
-	if got, want := aclf.AccessListFile("wombat"), ""; got != want {
+	if got, want := permsf.PermissionsFile("wombat"), ""; got != want {
 		t.Errorf("got %t, want %t", got, want)
 	}
-	if got, want := aclf.AccessListFile("baz"), "bar:baz.json"; got != want {
+	if got, want := permsf.PermissionsFile("baz"), "bar:baz.json"; got != want {
 		t.Errorf("got %t, want %t", got, want)
 	}
 }
 
-func TestAccessListLiteralFlags(t *testing.T) {
+func TestPermissionsLiteralFlags(t *testing.T) {
 	fs := flag.NewFlagSet("test", flag.ContinueOnError)
-	fl := flags.CreateAndRegister(fs, flags.Runtime, flags.AccessList)
+	fl := flags.CreateAndRegister(fs, flags.Runtime, flags.Permissions)
 	args := []string{"--v23.permissions.literal=hedgehog"}
 	fl.Parse(args, nil)
-	aclf := fl.AccessListFlags()
+	permsf := fl.PermissionsFlags()
 
-	if got, want := aclf.AccessListFile("runtime"), ""; got != want {
+	if got, want := permsf.PermissionsFile("runtime"), ""; got != want {
 		t.Errorf("got %t, want %t", got, want)
 	}
-	if got, want := aclf.AccessListLiteral(), "hedgehog"; got != want {
+	if got, want := permsf.PermissionsLiteral(), "hedgehog"; got != want {
 		t.Errorf("got %t, want %t, ok %t", got, want)
 	}
 }
 
-func TestAccessListLiteralBoth(t *testing.T) {
+func TestPermissionsLiteralBoth(t *testing.T) {
 	fs := flag.NewFlagSet("test", flag.ContinueOnError)
-	fl := flags.CreateAndRegister(fs, flags.Runtime, flags.AccessList)
+	fl := flags.CreateAndRegister(fs, flags.Runtime, flags.Permissions)
 	args := []string{"--v23.permissions.file=runtime:foo.json", "--v23.permissions.literal=hedgehog"}
 	fl.Parse(args, nil)
-	aclf := fl.AccessListFlags()
+	permsf := fl.PermissionsFlags()
 
-	if got, want := aclf.AccessListFile("runtime"), "foo.json"; got != want {
+	if got, want := permsf.PermissionsFile("runtime"), "foo.json"; got != want {
 		t.Errorf("got %t, want %t", got, want)
 	}
-	if got, want := aclf.AccessListLiteral(), "hedgehog"; got != want {
+	if got, want := permsf.PermissionsLiteral(), "hedgehog"; got != want {
 		t.Errorf("got %t, want %t, ok %t", got, want)
 	}
 }
@@ -112,7 +112,7 @@
 	}
 
 	fs = flag.NewFlagSet("test", flag.ContinueOnError)
-	fl = flags.CreateAndRegister(fs, flags.AccessList)
+	fl = flags.CreateAndRegister(fs, flags.Permissions)
 	args = []string{"--v23.permissions.file=noname"}
 	err = fl.Parse(args, nil)
 	if err == nil {
@@ -201,7 +201,7 @@
 	os.Setenv(rootEnvVar, "")
 	os.Setenv(rootEnvVar0, "")
 
-	fl := flags.CreateAndRegister(flag.NewFlagSet("test", flag.ContinueOnError), flags.Runtime, flags.AccessList)
+	fl := flags.CreateAndRegister(flag.NewFlagSet("test", flag.ContinueOnError), flags.Runtime, flags.Permissions)
 	if err := fl.Parse([]string{}, nil); err != nil {
 		t.Fatalf("unexpected error: %s", err)
 	}
@@ -209,8 +209,8 @@
 	if got, want := rtf.NamespaceRoots, []string{"/(dev.v.io/role/vprod/service/mounttabled)@ns.dev.v.io:8101"}; !reflect.DeepEqual(got, want) {
 		t.Errorf("got %q, want %q", got, want)
 	}
-	aclf := fl.AccessListFlags()
-	if got, want := aclf.AccessListFile(""), ""; got != want {
+	permsf := fl.PermissionsFlags()
+	if got, want := permsf.PermissionsFile(""), ""; got != want {
 		t.Errorf("got %q, want %q", got, want)
 	}
 }
diff --git a/lib/security/securityflag/flag.go b/lib/security/securityflag/flag.go
index c2f6acb..0c7b3fc 100644
--- a/lib/security/securityflag/flag.go
+++ b/lib/security/securityflag/flag.go
@@ -26,15 +26,16 @@
 var authFlags *flags.Flags
 
 func init() {
-	authFlags = flags.CreateAndRegister(flag.CommandLine, flags.AccessList)
+	authFlags = flags.CreateAndRegister(flag.CommandLine, flags.Permissions)
 }
 
-// NewAuthorizerOrDie constructs an Authorizer based on the provided "--v23.permissions.literal" or
-// "--v23.permissions.file" flags. Otherwise it creates a default Authorizer.
+// NewAuthorizerOrDie constructs an Authorizer based on the provided
+// "--v23.permissions.literal" or "--v23.permissions.file" flags. Otherwise it
+// creates a default Authorizer.
 func NewAuthorizerOrDie() security.Authorizer {
-	flags := authFlags.AccessListFlags()
-	fname := flags.AccessListFile("runtime")
-	literal := flags.AccessListLiteral()
+	flags := authFlags.PermissionsFlags()
+	fname := flags.PermissionsFile("runtime")
+	literal := flags.PermissionsLiteral()
 
 	if fname == "" && literal == "" {
 		return nil
@@ -57,13 +58,13 @@
 
 // TODO(rjkroege): Refactor these two functions into one by making an Authorizer
 // use a Permissions accessor interface.
-// PermissionsFromFlag reads the same flags as NewAuthorizerOrDie but
-// produces a Permissions for callers that need more control of how AccessLists
-// are managed.
+// PermissionsFromFlag reads the same flags as NewAuthorizerOrDie but produces a
+// Permissions for callers that need more control of how Permissions are
+// managed.
 func PermissionsFromFlag() (access.Permissions, error) {
-	flags := authFlags.AccessListFlags()
-	fname := flags.AccessListFile("runtime")
-	literal := flags.AccessListLiteral()
+	flags := authFlags.PermissionsFlags()
+	fname := flags.PermissionsFile("runtime")
+	literal := flags.PermissionsLiteral()
 
 	if fname == "" && literal == "" {
 		return nil, nil
diff --git a/profiles/internal/naming/namespace/acl.go b/profiles/internal/naming/namespace/perms.go
similarity index 63%
rename from profiles/internal/naming/namespace/acl.go
rename to profiles/internal/naming/namespace/perms.go
index 36b90bb..ed97813 100644
--- a/profiles/internal/naming/namespace/acl.go
+++ b/profiles/internal/naming/namespace/perms.go
@@ -14,29 +14,29 @@
 	"v.io/x/lib/vlog"
 )
 
-// setAccessListInMountTable sets the AccessList in a single server.
-func setAccessListInMountTable(ctx *context.T, client rpc.Client, name string, acl access.Permissions, version, id string, opts []rpc.CallOpt) (s status) {
+// setPermsInMountTable sets the Permissions in a single server.
+func setPermsInMountTable(ctx *context.T, client rpc.Client, name string, perms access.Permissions, version, id string, opts []rpc.CallOpt) (s status) {
 	s.id = id
 	ctx, _ = context.WithTimeout(ctx, callTimeout)
-	s.err = client.Call(ctx, name, "SetPermissions", []interface{}{acl, version}, nil, append(opts, options.NoResolve{})...)
+	s.err = client.Call(ctx, name, "SetPermissions", []interface{}{perms, version}, nil, append(opts, options.NoResolve{})...)
 	return
 }
 
-func (ns *namespace) SetPermissions(ctx *context.T, name string, acl access.Permissions, version string, opts ...naming.NamespaceOpt) error {
+func (ns *namespace) SetPermissions(ctx *context.T, name string, perms access.Permissions, version string, opts ...naming.NamespaceOpt) error {
 	defer vlog.LogCall()()
 	client := v23.GetClient(ctx)
 
 	// Apply to all mount tables implementing the name.
 	f := func(ctx *context.T, mt, id string) status {
-		return setAccessListInMountTable(ctx, client, mt, acl, version, id, getCallOpts(opts))
+		return setPermsInMountTable(ctx, client, mt, perms, version, id, getCallOpts(opts))
 	}
 	err := ns.dispatch(ctx, name, f, opts)
-	vlog.VI(1).Infof("SetPermissions(%s, %v, %s) -> %v", name, acl, version, err)
+	vlog.VI(1).Infof("SetPermissions(%s, %v, %s) -> %v", name, perms, version, err)
 	return err
 }
 
-// GetPermissions gets an AccessList from a mount table.
-func (ns *namespace) GetPermissions(ctx *context.T, name string, opts ...naming.NamespaceOpt) (acl access.Permissions, version string, err error) {
+// GetPermissions gets Permissions from a mount table.
+func (ns *namespace) GetPermissions(ctx *context.T, name string, opts ...naming.NamespaceOpt) (perms access.Permissions, version string, err error) {
 	defer vlog.LogCall()()
 	client := v23.GetClient(ctx)
 
@@ -53,6 +53,6 @@
 		err = serr
 		return
 	}
-	err = call.Finish(&acl, &version)
+	err = call.Finish(&perms, &version)
 	return
 }
diff --git a/profiles/internal/naming/namespace/acl_test.go b/profiles/internal/naming/namespace/perms_test.go
similarity index 82%
rename from profiles/internal/naming/namespace/acl_test.go
rename to profiles/internal/naming/namespace/perms_test.go
index 102fcf4..01ce1b2 100644
--- a/profiles/internal/naming/namespace/acl_test.go
+++ b/profiles/internal/naming/namespace/perms_test.go
@@ -72,7 +72,7 @@
 
 var nobody = []security.BlessingPattern{""}
 var everybody = []security.BlessingPattern{"..."}
-var closedAccessList = access.Permissions{
+var closedPerms = access.Permissions{
 	"Resolve": access.AccessList{
 		In: nobody,
 	},
@@ -89,7 +89,7 @@
 		In: nobody,
 	},
 }
-var openAccessList = access.Permissions{
+var openPerms = access.Permissions{
 	"Resolve": access.AccessList{
 		In: everybody,
 	},
@@ -107,9 +107,9 @@
 	},
 }
 
-func TestAccessLists(t *testing.T) {
+func TestPermissions(t *testing.T) {
 	// Create three different personalities.
-	// TODO(p): Use the multiple personalities to test AccessList functionality.
+	// TODO(p): Use the multiple personalities to test Permissions functionality.
 	rootCtx, aliceCtx, _, shutdown := initTest()
 	defer shutdown()
 
@@ -136,34 +136,34 @@
 		t.Fatalf("Failed to Mount %s onto a/b/c: %s", "/"+mt2Addr, err)
 	}
 
-	// Set/Get the mount point's AccessList.
-	acl, version, err := ns.GetPermissions(rootCtx, "a/b/c")
+	// Set/Get the mount point's Permissions.
+	perms, version, err := ns.GetPermissions(rootCtx, "a/b/c")
 	if err != nil {
 		t.Fatalf("GetPermissions a/b/c: %s", err)
 	}
-	if err := ns.SetPermissions(rootCtx, "a/b/c", openAccessList, version); err != nil {
+	if err := ns.SetPermissions(rootCtx, "a/b/c", openPerms, version); err != nil {
 		t.Fatalf("SetPermissions a/b/c: %s", err)
 	}
 	nacl, _, err := ns.GetPermissions(rootCtx, "a/b/c")
 	if err != nil {
 		t.Fatalf("GetPermissions a/b/c: %s", err)
 	}
-	if !reflect.DeepEqual(openAccessList, nacl) {
-		t.Fatalf("want %v, got %v", openAccessList, nacl)
+	if !reflect.DeepEqual(openPerms, nacl) {
+		t.Fatalf("want %v, got %v", openPerms, nacl)
 	}
 
-	// Now Set/Get the parallel mount point's AccessList.
+	// Now Set/Get the parallel mount point's Permissions.
 	name := "a/b/c/d/e"
-	version = "" // Parallel setacl with any other value is dangerous
-	if err := ns.SetPermissions(rootCtx, name, openAccessList, version); err != nil {
+	version = "" // Parallel setperms with any other value is dangerous
+	if err := ns.SetPermissions(rootCtx, name, openPerms, version); err != nil {
 		t.Fatalf("SetPermissions %s: %s", name, err)
 	}
 	nacl, _, err = ns.GetPermissions(rootCtx, name)
 	if err != nil {
 		t.Fatalf("GetPermissions %s: %s", name, err)
 	}
-	if !reflect.DeepEqual(openAccessList, nacl) {
-		t.Fatalf("want %v, got %v", openAccessList, nacl)
+	if !reflect.DeepEqual(openPerms, nacl) {
+		t.Fatalf("want %v, got %v", openPerms, nacl)
 	}
 
 	// Get from each server individually to make sure both are set.
@@ -172,30 +172,30 @@
 	if err != nil {
 		t.Fatalf("GetPermissions %s: %s", name, err)
 	}
-	if !reflect.DeepEqual(openAccessList, nacl) {
-		t.Fatalf("want %v, got %v", openAccessList, nacl)
+	if !reflect.DeepEqual(openPerms, nacl) {
+		t.Fatalf("want %v, got %v", openPerms, nacl)
 	}
 	name = naming.Join(mt2Addr, "d/e")
 	nacl, _, err = ns.GetPermissions(rootCtx, name)
 	if err != nil {
 		t.Fatalf("GetPermissions %s: %s", name, err)
 	}
-	if !reflect.DeepEqual(openAccessList, nacl) {
-		t.Fatalf("want %v, got %v", acl, nacl)
+	if !reflect.DeepEqual(openPerms, nacl) {
+		t.Fatalf("want %v, got %v", perms, nacl)
 	}
 
 	// Create mount points accessible only by root's key.
 	name = "a/b/c/d/f"
 	deadbody := "/the:8888/rain"
-	if err := ns.SetPermissions(rootCtx, name, closedAccessList, version); err != nil {
+	if err := ns.SetPermissions(rootCtx, name, closedPerms, version); err != nil {
 		t.Fatalf("SetPermissions %s: %s", name, err)
 	}
 	nacl, _, err = ns.GetPermissions(rootCtx, name)
 	if err != nil {
 		t.Fatalf("GetPermissions %s: %s", name, err)
 	}
-	if !reflect.DeepEqual(closedAccessList, nacl) {
-		t.Fatalf("want %v, got %v", closedAccessList, nacl)
+	if !reflect.DeepEqual(closedPerms, nacl) {
+		t.Fatalf("want %v, got %v", closedPerms, nacl)
 	}
 	if err := ns.Mount(rootCtx, name, deadbody, 10000); err != nil {
 		t.Fatalf("Mount %s: %s", name, err)
@@ -215,7 +215,7 @@
 
 	// Create a mount point via Serve accessible only by root's key.
 	name = "a/b/c/d/g"
-	if err := ns.SetPermissions(rootCtx, name, closedAccessList, version); err != nil {
+	if err := ns.SetPermissions(rootCtx, name, closedPerms, version); err != nil {
 		t.Fatalf("SetPermissions %s: %s", name, err)
 	}
 	server, err := v23.NewServer(rootCtx)
diff --git a/profiles/internal/rpc/full_test.go b/profiles/internal/rpc/full_test.go
index 7729e21..2e47921 100644
--- a/profiles/internal/rpc/full_test.go
+++ b/profiles/internal/rpc/full_test.go
@@ -178,7 +178,7 @@
 
 func (t testServerDisp) Lookup(suffix string) (interface{}, security.Authorizer, error) {
 	// If suffix is "nilAuth" we use default authorization, if it is "aclAuth" we
-	// use an AccessList based authorizer, and otherwise we use the custom testServerAuthorizer.
+	// use an AccessList-based authorizer, and otherwise we use the custom testServerAuthorizer.
 	var authorizer security.Authorizer
 	switch suffix {
 	case "discharger":
diff --git a/profiles/internal/testing/mocks/naming/namespace.go b/profiles/internal/testing/mocks/naming/namespace.go
index f65ba16..cdfe4b7 100644
--- a/profiles/internal/testing/mocks/naming/namespace.go
+++ b/profiles/internal/testing/mocks/naming/namespace.go
@@ -160,13 +160,13 @@
 	return nil
 }
 
-func (ns *namespaceMock) GetPermissions(ctx *context.T, name string, opts ...naming.NamespaceOpt) (acl access.Permissions, version string, err error) {
+func (ns *namespaceMock) GetPermissions(ctx *context.T, name string, opts ...naming.NamespaceOpt) (perms access.Permissions, version string, err error) {
 	defer vlog.LogCall()()
 	panic("Calling GetPermissions on a mock namespace.  This is not supported.")
 	return nil, "", nil
 }
 
-func (ns *namespaceMock) SetPermissions(ctx *context.T, name string, acl access.Permissions, version string, opts ...naming.NamespaceOpt) error {
+func (ns *namespaceMock) SetPermissions(ctx *context.T, name string, perms access.Permissions, version string, opts ...naming.NamespaceOpt) error {
 	defer vlog.LogCall()()
 	panic("Calling SetPermissions on a mock namespace.  This is not supported.")
 	return nil
diff --git a/profiles/internal/vtrace/vtrace_test.go b/profiles/internal/vtrace/vtrace_test.go
index 9e04fff..b1148ad 100644
--- a/profiles/internal/vtrace/vtrace_test.go
+++ b/profiles/internal/vtrace/vtrace_test.go
@@ -334,8 +334,8 @@
 
 type debugDispatcher string
 
-func (acls debugDispatcher) Lookup(string) (interface{}, security.Authorizer, error) {
-	perms, err := access.ReadPermissions(strings.NewReader(string(acls)))
+func (permsDisp debugDispatcher) Lookup(string) (interface{}, security.Authorizer, error) {
+	perms, err := access.ReadPermissions(strings.NewReader(string(permsDisp)))
 	if err != nil {
 		return nil, nil, err
 	}
diff --git a/services/application/application/impl_test.go b/services/application/application/impl_test.go
index 6eeb077..8c8f0fe 100644
--- a/services/application/application/impl_test.go
+++ b/services/application/application/impl_test.go
@@ -94,8 +94,8 @@
 	return nil
 }
 
-func (s *server) SetPermissions(_ *context.T, _ rpc.ServerCall, acl access.Permissions, version string) error {
-	vlog.VI(2).Infof("%v.SetPermissions(%v, %v) was called", acl, version)
+func (s *server) SetPermissions(_ *context.T, _ rpc.ServerCall, perms access.Permissions, version string) error {
+	vlog.VI(2).Infof("%v.SetPermissions(%v, %v) was called", perms, version)
 	return nil
 }
 
diff --git a/services/application/applicationd/dispatcher.go b/services/application/applicationd/dispatcher.go
index 9d2e65d..a6ad666 100644
--- a/services/application/applicationd/dispatcher.go
+++ b/services/application/applicationd/dispatcher.go
@@ -13,8 +13,8 @@
 	"v.io/v23/security/access"
 	"v.io/v23/verror"
 
-	"v.io/x/ref/services/internal/acls"
 	"v.io/x/ref/services/internal/fs"
+	"v.io/x/ref/services/internal/pathperms"
 	"v.io/x/ref/services/repository"
 )
 
@@ -40,22 +40,22 @@
 		return nil, nil, err
 	}
 
-	auth, err := acls.NewHierarchicalAuthorizer(
+	auth, err := pathperms.NewHierarchicalAuthorizer(
 		naming.Join("/acls", "data"),
 		naming.Join("/acls", name, "data"),
-		(*applicationAccessListStore)(d.store))
+		(*applicationPermsStore)(d.store))
 	if err != nil {
 		return nil, nil, err
 	}
 	return repository.ApplicationServer(NewApplicationService(d.store, d.storeRoot, suffix)), auth, nil
 }
 
-type applicationAccessListStore fs.Memstore
+type applicationPermsStore fs.Memstore
 
-// TAMForPath implements TAMGetter so that applicationd can use the
-// hierarchicalAuthorizer
-func (store *applicationAccessListStore) TAMForPath(path string) (access.Permissions, bool, error) {
-	tam, _, err := getAccessList((*fs.Memstore)(store), path)
+// PermsForPath implements PermsGetter so that applicationd can use the
+// hierarchicalAuthorizer.
+func (store *applicationPermsStore) PermsForPath(path string) (access.Permissions, bool, error) {
+	perms, _, err := getPermissions((*fs.Memstore)(store), path)
 
 	if verror.ErrorID(err) == verror.ErrNoExist.ID {
 		return nil, true, nil
@@ -63,5 +63,5 @@
 	if err != nil {
 		return nil, false, err
 	}
-	return tam, false, nil
+	return perms, false, nil
 }
diff --git a/services/application/applicationd/acl_test.go b/services/application/applicationd/perms_test.go
similarity index 81%
rename from services/application/applicationd/acl_test.go
rename to services/application/applicationd/perms_test.go
index ecca68a..e787080 100644
--- a/services/application/applicationd/acl_test.go
+++ b/services/application/applicationd/perms_test.go
@@ -36,7 +36,7 @@
 
 func appRepository(stdin io.Reader, stdout, stderr io.Writer, env map[string]string, args ...string) error {
 	if len(args) < 2 {
-		vlog.Fatalf("repository expected at least name and store arguments and optionally AccessList flags per PermissionsFromFlag")
+		vlog.Fatalf("repository expected at least name and store arguments and optionally Permissions flags per PermissionsFromFlag")
 	}
 	publishName := args[0]
 	storedir := args[1]
@@ -68,15 +68,14 @@
 	return nil
 }
 
-func TestApplicationUpdateAccessList(t *testing.T) {
+func TestApplicationUpdatePermissions(t *testing.T) {
 	ctx, shutdown := test.InitForTest()
 	defer shutdown()
 	v23.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
 
-	// By default, all principals in this test will have blessings
-	// generated based on the username/machine running this process. Give
-	// them recognizable names ("root/self" etc.), so the AccessLists can be set
-	// deterministically.
+	// By default, all principals in this test will have blessings generated based
+	// on the username/machine running this process. Give them recognizable names
+	// ("root/self" etc.), so the Permissions can be set deterministically.
 	idp := testutil.NewIDProvider("root")
 	if err := idp.Bless(v23.GetPrincipal(ctx), "self"); err != nil {
 		t.Fatal(err)
@@ -122,7 +121,7 @@
 	}
 
 	vlog.VI(2).Infof("Accessing the Permission Lists of the root returns a (simulated) list providing default authorization.")
-	acl, version, err := repostub.GetPermissions(ctx)
+	perms, version, err := repostub.GetPermissions(ctx)
 	if err != nil {
 		t.Fatalf("GetPermissions should not have failed: %v", err)
 	}
@@ -145,26 +144,26 @@
 		"Resolve": access.AccessList{
 			In:    []security.BlessingPattern{"root/$", "root/self/$", "root/self/child"},
 			NotIn: []string(nil)}}
-	if got := acl; !reflect.DeepEqual(expected.Normalize(), got.Normalize()) {
+	if got := perms; !reflect.DeepEqual(expected.Normalize(), got.Normalize()) {
 		t.Errorf("got %#v, exected %#v ", got, expected)
 	}
 
 	vlog.VI(2).Infof("self attempting to give other permission to update application")
-	newAccessList := make(access.Permissions)
+	newPerms := make(access.Permissions)
 	for _, tag := range access.AllTypicalTags() {
-		newAccessList.Add("root/self", string(tag))
-		newAccessList.Add("root/other", string(tag))
+		newPerms.Add("root/self", string(tag))
+		newPerms.Add("root/other", string(tag))
 	}
-	if err := repostub.SetPermissions(ctx, newAccessList, ""); err != nil {
+	if err := repostub.SetPermissions(ctx, newPerms, ""); err != nil {
 		t.Fatalf("SetPermissions failed: %v", err)
 	}
 
-	acl, version, err = repostub.GetPermissions(ctx)
+	perms, version, err = repostub.GetPermissions(ctx)
 	if err != nil {
 		t.Fatalf("GetPermissions should not have failed: %v", err)
 	}
-	expected = newAccessList
-	if got := acl; !reflect.DeepEqual(expected.Normalize(), got.Normalize()) {
+	expected = newPerms
+	if got := perms; !reflect.DeepEqual(expected.Normalize(), got.Normalize()) {
 		t.Errorf("got %#v, exected %#v ", got, expected)
 	}
 
@@ -174,14 +173,14 @@
 	}
 
 	// Other takes control.
-	acl, version, err = repostub.GetPermissions(otherCtx)
+	perms, version, err = repostub.GetPermissions(otherCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions 2 should not have failed: %v", err)
 	}
-	acl["Admin"] = access.AccessList{
+	perms["Admin"] = access.AccessList{
 		In:    []security.BlessingPattern{"root/other"},
 		NotIn: []string{}}
-	if err = repostub.SetPermissions(otherCtx, acl, version); err != nil {
+	if err = repostub.SetPermissions(otherCtx, perms, version); err != nil {
 		t.Fatalf("SetPermissions failed: %v", err)
 	}
 
@@ -189,7 +188,7 @@
 	if _, _, err = repostub.GetPermissions(ctx); err == nil {
 		t.Fatalf("GetPermissions should not have succeeded")
 	}
-	acl, _, err = repostub.GetPermissions(otherCtx)
+	perms, _, err = repostub.GetPermissions(otherCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions should not have failed: %v", err)
 	}
@@ -210,19 +209,18 @@
 			"root/self"},
 			NotIn: []string{}}}
 
-	if got := acl; !reflect.DeepEqual(expected.Normalize(), got.Normalize()) {
+	if got := perms; !reflect.DeepEqual(expected.Normalize(), got.Normalize()) {
 		t.Errorf("got %#v, exected %#v ", got, expected)
 	}
 }
 
-func TestPerAppAccessList(t *testing.T) {
+func TestPerAppPermissions(t *testing.T) {
 	ctx, shutdown := test.InitForTest()
 	defer shutdown()
 	v23.GetNamespace(ctx).CacheCtl(naming.DisableCache(true))
-	// By default, all principals in this test will have blessings
-	// generated based on the username/machine running this process. Give
-	// them recognizable names ("root/self" etc.), so the AccessLists can be set
-	// deterministically.
+	// By default, all principals in this test will have blessings generated based
+	// on the username/machine running this process. Give them recognizable names
+	// ("root/self" etc.), so the Permissions can be set deterministically.
 	idp := testutil.NewIDProvider("root")
 	if err := idp.Bless(v23.GetPrincipal(ctx), "self"); err != nil {
 		t.Fatal(err)
@@ -268,7 +266,7 @@
 		t.Fatalf("Put() failed: %v", err)
 	}
 
-	vlog.VI(2).Info("Self can access.AccessLists but other can't.")
+	vlog.VI(2).Info("Self can access Permissions but other can't.")
 	expectedSelfPermissions := access.Permissions{
 		"Admin": access.AccessList{
 			In:    []security.BlessingPattern{"root/$", "root/self"},
@@ -284,12 +282,12 @@
 
 	for _, path := range []string{"repo/search", "repo/search/v1", "repo/search/v2", "repo/naps", "repo/naps/v1"} {
 		stub := repository.ApplicationClient(path)
-		acl, _, err := stub.GetPermissions(ctx)
+		perms, _, err := stub.GetPermissions(ctx)
 		if err != nil {
 			t.Fatalf("Newly uploaded envelopes failed to receive permission lists: %v", err)
 		}
 
-		if got := acl; !reflect.DeepEqual(expectedSelfPermissions.Normalize(), got.Normalize()) {
+		if got := perms; !reflect.DeepEqual(expectedSelfPermissions.Normalize(), got.Normalize()) {
 			t.Errorf("got %#v, expected %#v ", got, expectedSelfPermissions)
 		}
 
@@ -299,13 +297,13 @@
 		}
 	}
 
-	vlog.VI(2).Infof("Self sets root AccessLists.")
+	vlog.VI(2).Infof("Self sets root Permissions.")
 	repostub := repository.ApplicationClient("repo")
-	newAccessList := make(access.Permissions)
+	newPerms := make(access.Permissions)
 	for _, tag := range access.AllTypicalTags() {
-		newAccessList.Add("root/self", string(tag))
+		newPerms.Add("root/self", string(tag))
 	}
-	if err := repostub.SetPermissions(ctx, newAccessList, ""); err != nil {
+	if err := repostub.SetPermissions(ctx, newPerms, ""); err != nil {
 		t.Fatalf("SetPermissions failed: %v", err)
 	}
 
@@ -315,14 +313,14 @@
 	}
 
 	vlog.VI(2).Infof("Self gives other full access to repo/search/...")
-	newAccessList, version, err := v1stub.GetPermissions(ctx)
+	newPerms, version, err := v1stub.GetPermissions(ctx)
 	if err != nil {
 		t.Fatalf("GetPermissions should not have failed: %v", err)
 	}
 	for _, tag := range access.AllTypicalTags() {
-		newAccessList.Add("root/other", string(tag))
+		newPerms.Add("root/other", string(tag))
 	}
-	if err := v1stub.SetPermissions(ctx, newAccessList, version); err != nil {
+	if err := v1stub.SetPermissions(ctx, newPerms, version); err != nil {
 		t.Fatalf("SetPermissions failed: %v", err)
 	}
 
@@ -356,12 +354,12 @@
 	for _, path := range []string{"repo/search", "repo/search/v1", "repo/search/v2"} {
 		stub := repository.ApplicationClient(path)
 		vlog.VI(2).Infof("Other can now access this app independent of version.")
-		acl, _, err := stub.GetPermissions(otherCtx)
+		perms, _, err := stub.GetPermissions(otherCtx)
 		if err != nil {
 			t.Fatalf("GetPermissions should not have failed: %v", err)
 		}
 
-		if got := acl; !reflect.DeepEqual(expected.Normalize(), got.Normalize()) {
+		if got := perms; !reflect.DeepEqual(expected.Normalize(), got.Normalize()) {
 			t.Errorf("got %#v, expected %#v ", got, expected)
 		}
 		vlog.VI(2).Infof("Self can also access thanks to hierarchical auth.")
@@ -379,12 +377,12 @@
 	}
 
 	// Self gives other write perms on base.
-	newAccessList, version, err = repostub.GetPermissions(ctx)
+	newPerms, version, err = repostub.GetPermissions(ctx)
 	if err != nil {
 		t.Fatalf("GetPermissions should not have failed: %v", err)
 	}
-	newAccessList["Write"] = access.AccessList{In: []security.BlessingPattern{"root/other", "root/self"}}
-	if err := repostub.SetPermissions(ctx, newAccessList, version); err != nil {
+	newPerms["Write"] = access.AccessList{In: []security.BlessingPattern{"root/other", "root/self"}}
+	if err := repostub.SetPermissions(ctx, newPerms, version); err != nil {
 		t.Fatalf("SetPermissions failed: %v", err)
 	}
 
@@ -395,19 +393,19 @@
 		}
 	}
 
-	// But because application search already exists, the ACLs do not change.
+	// But because application search already exists, the Permissions do not change.
 	for _, path := range []string{"repo/search", "repo/search/v1", "repo/search/v2"} {
 		stub := repository.ApplicationClient(path)
-		acl, _, err := stub.GetPermissions(otherCtx)
+		perms, _, err := stub.GetPermissions(otherCtx)
 		if err != nil {
 			t.Fatalf("GetPermissions should not have failed: %v", err)
 		}
-		if got := acl; !reflect.DeepEqual(expected.Normalize(), got.Normalize()) {
+		if got := perms; !reflect.DeepEqual(expected.Normalize(), got.Normalize()) {
 			t.Errorf("got %#v, expected %#v ", got, expected)
 		}
 	}
 
-	// But self didn't give other AccessList modification permissions.
+	// But self didn't give other Permissions modification permissions.
 	for _, path := range []string{"repo/search", "repo/search/v2"} {
 		stub := repository.ApplicationClient(path)
 		if _, _, err := stub.GetPermissions(otherCtx); err != nil {
diff --git a/services/application/applicationd/service.go b/services/application/applicationd/service.go
index d0c70a1..e79ff03 100644
--- a/services/application/applicationd/service.go
+++ b/services/application/applicationd/service.go
@@ -7,8 +7,8 @@
 import (
 	"strings"
 
-	"v.io/x/ref/services/internal/acls"
 	"v.io/x/ref/services/internal/fs"
+	"v.io/x/ref/services/internal/pathperms"
 	"v.io/x/ref/services/repository"
 
 	"v.io/v23/context"
@@ -105,8 +105,7 @@
 		return err
 	}
 
-	// Only add a Permission list value if there is not already one
-	// present.
+	// Only add a Permissions value if there is not already one present.
 	apath := naming.Join("/acls", name, "data")
 	aobj := i.store.BindObject(apath)
 	if _, err := aobj.Get(call); verror.ErrorID(err) == fs.ErrNotInMemStore.ID {
@@ -115,8 +114,8 @@
 			// None of the client's blessings are valid.
 			return verror.New(ErrNotAuthorized, ctx)
 		}
-		newacls := acls.PermissionsForBlessings(rb)
-		if _, err := aobj.Put(nil, newacls); err != nil {
+		newperms := pathperms.PermissionsForBlessings(rb)
+		if _, err := aobj.Put(nil, newperms); err != nil {
 			return err
 		}
 	}
@@ -248,7 +247,7 @@
 	return ch, nil
 }
 
-func (i *appRepoService) GetPermissions(ctx *context.T, call rpc.ServerCall) (acl access.Permissions, version string, err error) {
+func (i *appRepoService) GetPermissions(ctx *context.T, call rpc.ServerCall) (perms access.Permissions, version string, err error) {
 	name, _, err := parse(ctx, i.suffix)
 	if err != nil {
 		return nil, "", err
@@ -257,15 +256,15 @@
 	defer i.store.Unlock()
 	path := naming.Join("/acls", name, "data")
 
-	acl, version, err = getAccessList(i.store, path)
+	perms, version, err = getPermissions(i.store, path)
 	if verror.ErrorID(err) == verror.ErrNoExist.ID {
-		return acls.NilAuthPermissions(ctx, call.Security()), "", nil
+		return pathperms.NilAuthPermissions(ctx, call.Security()), "", nil
 	}
 
-	return acl, version, err
+	return perms, version, err
 }
 
-func (i *appRepoService) SetPermissions(ctx *context.T, _ rpc.ServerCall, acl access.Permissions, version string) error {
+func (i *appRepoService) SetPermissions(ctx *context.T, _ rpc.ServerCall, perms access.Permissions, version string) error {
 	name, _, err := parse(ctx, i.suffix)
 	if err != nil {
 		return err
@@ -273,39 +272,39 @@
 	i.store.Lock()
 	defer i.store.Unlock()
 	path := naming.Join("/acls", name, "data")
-	return setAccessList(i.store, path, acl, version)
+	return setPermissions(i.store, path, perms, version)
 }
 
-// getAccessList fetches a Permissions out of the Memstore at the provided path.
+// getPermissions fetches a Permissions out of the Memstore at the provided path.
 // path is expected to already have been cleaned by naming.Join or its ilk.
-func getAccessList(store *fs.Memstore, path string) (access.Permissions, string, error) {
+func getPermissions(store *fs.Memstore, path string) (access.Permissions, string, error) {
 	entry, err := store.BindObject(path).Get(nil)
 
 	if verror.ErrorID(err) == fs.ErrNotInMemStore.ID {
-		// No AccessList exists
+		// No Permissions exists
 		return nil, "", verror.New(verror.ErrNoExist, nil)
 	} else if err != nil {
-		vlog.Errorf("getAccessList: internal failure in fs.Memstore")
+		vlog.Errorf("getPermissions: internal failure in fs.Memstore")
 		return nil, "", err
 	}
 
-	acl, ok := entry.Value.(access.Permissions)
+	perms, ok := entry.Value.(access.Permissions)
 	if !ok {
 		return nil, "", err
 	}
 
-	version, err := acls.ComputeVersion(acl)
+	version, err := pathperms.ComputeVersion(perms)
 	if err != nil {
 		return nil, "", err
 	}
-	return acl, version, nil
+	return perms, version, nil
 }
 
-// setAccessList writes a Permissions into the Memstore at the provided path.
+// setPermissions writes a Permissions into the Memstore at the provided path.
 // where path is expected to have already been cleaned by naming.Join.
-func setAccessList(store *fs.Memstore, path string, acl access.Permissions, version string) error {
+func setPermissions(store *fs.Memstore, path string, perms access.Permissions, version string) error {
 	if version != "" {
-		_, oversion, err := getAccessList(store, path)
+		_, oversion, err := getPermissions(store, path)
 		if verror.ErrorID(err) == verror.ErrNoExist.ID {
 			oversion = version
 		} else if err != nil {
@@ -324,7 +323,7 @@
 
 	object := store.BindObject(path)
 
-	if _, err := object.Put(nil, acl); err != nil {
+	if _, err := object.Put(nil, perms); err != nil {
 		return err
 	}
 	if err := store.BindTransaction(tname).Commit(nil); err != nil {
diff --git a/services/binary/binary/impl_test.go b/services/binary/binary/impl_test.go
index a97dcb7..2b6c87d 100644
--- a/services/binary/binary/impl_test.go
+++ b/services/binary/binary/impl_test.go
@@ -81,11 +81,11 @@
 	return nil
 }
 
-func (s *server) GetPermissions(*context.T, rpc.ServerCall) (acl access.Permissions, version string, err error) {
+func (s *server) GetPermissions(*context.T, rpc.ServerCall) (perms access.Permissions, version string, err error) {
 	return nil, "", nil
 }
 
-func (s *server) SetPermissions(_ *context.T, _ rpc.ServerCall, acl access.Permissions, version string) error {
+func (s *server) SetPermissions(_ *context.T, _ rpc.ServerCall, perms access.Permissions, version string) error {
 	return nil
 }
 
diff --git a/services/build/buildd/buildd_v23_test.go b/services/build/buildd/buildd_v23_test.go
index 8ad4515..68381bb 100644
--- a/services/build/buildd/buildd_v23_test.go
+++ b/services/build/buildd/buildd_v23_test.go
@@ -35,9 +35,8 @@
 	v23tests.RunRootMT(i, "--v23.tcp.address=127.0.0.1:0")
 
 	// Build binaries for the client and server.
-	// Since ACLs are not setup on the server, the client must pass the
-	// default authorization policy, i.e., must be a "delegate" of the
-	// server.
+	// Since Permissions are not setup on the server, the client must pass the
+	// default authorization policy, i.e., must be a "delegate" of the server.
 	var (
 		buildServerBin = binaryWithCredentials(i, "buildd", "v.io/x/ref/services/build/buildd")
 		buildBin       = binaryWithCredentials(i, "buildd/client", "v.io/x/ref/services/build/build")
diff --git a/services/device/device/acl_fmt.go b/services/device/device/acl_fmt.go
index feeeb0e..e8ea558 100644
--- a/services/device/device/acl_fmt.go
+++ b/services/device/device/acl_fmt.go
@@ -12,16 +12,16 @@
 	"v.io/v23/security"
 )
 
-// aclEntries maps blessing patterns to the kind of access they should have.
-type aclEntries map[string]accessTags
+// permsEntries maps blessing patterns to the kind of access they should have.
+type permsEntries map[string]accessTags
 
 // accessTags maps access tags to whether they should be blacklisted
 // (i.e., part of the NotIn list) or not (part of the In list).
 //
 // TODO(ashankar,caprita): This structure is not friendly to a blessing
-// appearing in both the "In" and "NotIn" lists of an AccessList. Arguably, such an
-// AccessList is silly (In: ["foo"], NotIn: ["foo"]), but is legal. This structure can
-// end up hiding that.
+// appearing in both the "In" and "NotIn" lists of an AccessList. Arguably, such
+// an AccessList is silly (In: ["foo"], NotIn: ["foo"]), but is legal. This
+// structure can end up hiding that.
 type accessTags map[string]bool
 
 // String representation of access tags.  Between String and parseAccessTags,
@@ -60,7 +60,7 @@
 	return ret, nil
 }
 
-func (entries aclEntries) String() string {
+func (entries permsEntries) String() string {
 	var list []string
 	for pattern, _ := range entries {
 		list = append(list, pattern)
@@ -72,7 +72,7 @@
 	return strings.Join(list, "\n")
 }
 
-func (entries aclEntries) Tags(pattern string) accessTags {
+func (entries permsEntries) Tags(pattern string) accessTags {
 	tags, exists := entries[pattern]
 	if !exists {
 		tags = make(accessTags)
diff --git a/services/device/device/acl_impl.go b/services/device/device/acl_impl.go
index 5eacbfa..9e0c940 100644
--- a/services/device/device/acl_impl.go
+++ b/services/device/device/acl_impl.go
@@ -4,7 +4,7 @@
 
 package main
 
-// Commands to get/set AccessLists.
+// Commands to get/set Permissions.
 
 import (
 	"fmt"
@@ -19,8 +19,8 @@
 var cmdGet = &cmdline.Command{
 	Run:      runGet,
 	Name:     "get",
-	Short:    "Get AccessLists for the given target.",
-	Long:     "Get AccessLists for the given target.",
+	Short:    "Get Permissions for the given target.",
+	Long:     "Get Permissions for the given target.",
 	ArgsName: "<device manager name>",
 	ArgsLong: `
 <device manager name> can be a Vanadium name for a device manager,
@@ -33,17 +33,17 @@
 	}
 
 	vanaName := args[0]
-	objAccessList, _, err := device.ApplicationClient(vanaName).GetPermissions(gctx)
+	objPerms, _, err := device.ApplicationClient(vanaName).GetPermissions(gctx)
 	if err != nil {
 		return fmt.Errorf("GetPermissions on %s failed: %v", vanaName, err)
 	}
-	// Convert objAccessList (Permissions) into aclEntries for pretty printing.
-	entries := make(aclEntries)
-	for tag, acl := range objAccessList {
-		for _, p := range acl.In {
+	// Convert objPerms (Permissions) into permsEntries for pretty printing.
+	entries := make(permsEntries)
+	for tag, perms := range objPerms {
+		for _, p := range perms.In {
 			entries.Tags(string(p))[tag] = false
 		}
-		for _, b := range acl.NotIn {
+		for _, b := range perms.NotIn {
 			entries.Tags(b)[tag] = true
 		}
 	}
@@ -57,8 +57,8 @@
 var cmdSet = &cmdline.Command{
 	Run:      runSet,
 	Name:     "set",
-	Short:    "Set AccessLists for the given target.",
-	Long:     "Set AccessLists for the given target",
+	Short:    "Set Permissions for the given target.",
+	Long:     "Set Permissions for the given target",
 	ArgsName: "<device manager name>  (<blessing> [!]<tag>(,[!]<tag>)*",
 	ArgsLong: `
 <device manager name> can be a Vanadium name for a device manager,
@@ -95,7 +95,7 @@
 	vanaName := args[0]
 	pairs := args[1:]
 
-	entries := make(aclEntries)
+	entries := make(permsEntries)
 	for i := 0; i < len(pairs); i += 2 {
 		blessing := pairs[i]
 		tags, err := parseAccessTags(pairs[i+1])
@@ -105,26 +105,26 @@
 		entries[blessing] = tags
 	}
 
-	// Set the AccessLists on the specified names.
+	// Set the Permissions on the specified names.
 	for {
-		objAccessList, version := make(access.Permissions), ""
+		objPerms, version := make(access.Permissions), ""
 		if !forceSet {
 			var err error
-			if objAccessList, version, err = device.ApplicationClient(vanaName).GetPermissions(gctx); err != nil {
+			if objPerms, version, err = device.ApplicationClient(vanaName).GetPermissions(gctx); err != nil {
 				return fmt.Errorf("GetPermissions(%s) failed: %v", vanaName, err)
 			}
 		}
 		for blessingOrPattern, tags := range entries {
-			objAccessList.Clear(blessingOrPattern) // Clear out any existing references
+			objPerms.Clear(blessingOrPattern) // Clear out any existing references
 			for tag, blacklist := range tags {
 				if blacklist {
-					objAccessList.Blacklist(blessingOrPattern, tag)
+					objPerms.Blacklist(blessingOrPattern, tag)
 				} else {
-					objAccessList.Add(security.BlessingPattern(blessingOrPattern), tag)
+					objPerms.Add(security.BlessingPattern(blessingOrPattern), tag)
 				}
 			}
 		}
-		switch err := device.ApplicationClient(vanaName).SetPermissions(gctx, objAccessList, version); {
+		switch err := device.ApplicationClient(vanaName).SetPermissions(gctx, objPerms, version); {
 		case err != nil && verror.ErrorID(err) != verror.ErrBadVersion.ID:
 			return fmt.Errorf("SetPermissions(%s) failed: %v", vanaName, err)
 		case err == nil:
@@ -138,9 +138,9 @@
 func aclRoot() *cmdline.Command {
 	return &cmdline.Command{
 		Name:  "acl",
-		Short: "Tool for setting device manager AccessLists",
+		Short: "Tool for setting device manager Permissions",
 		Long: `
-The acl tool manages AccessLists on the device manger, installations and instances.
+The acl tool manages Permissions on the device manger, installations and instances.
 `,
 		Children: []*cmdline.Command{cmdGet, cmdSet},
 	}
diff --git a/services/device/device/acl_test.go b/services/device/device/acl_test.go
index 873c9cd..e8a3449 100644
--- a/services/device/device/acl_test.go
+++ b/services/device/device/acl_test.go
@@ -44,7 +44,7 @@
 	// Test the 'get' command.
 	rootTape := tapes.forSuffix("")
 	rootTape.SetResponses([]interface{}{GetPermissionsResponse{
-		acl: access.Permissions{
+		perms: access.Permissions{
 			"Admin": access.AccessList{
 				In:    []security.BlessingPattern{"self"},
 				NotIn: []string{"self/bad"},
@@ -129,7 +129,7 @@
 	stdout.Reset()
 	rootTape := tapes.forSuffix("")
 	rootTape.SetResponses([]interface{}{GetPermissionsResponse{
-		acl: access.Permissions{
+		perms: access.Permissions{
 			"Admin": access.AccessList{
 				In: []security.BlessingPattern{"self"},
 			},
@@ -143,7 +143,7 @@
 	},
 		verror.NewErrBadVersion(nil),
 		GetPermissionsResponse{
-			acl: access.Permissions{
+			perms: access.Permissions{
 				"Admin": access.AccessList{
 					In: []security.BlessingPattern{"self"},
 				},
@@ -185,7 +185,7 @@
 		"GetPermissions",
 		SetPermissionsStimulus{
 			fun: "SetPermissions",
-			acl: access.Permissions{
+			perms: access.Permissions{
 				"Admin": access.AccessList{
 					In:    []security.BlessingPattern{"friends", "self"},
 					NotIn: []string{"friends/alice"},
@@ -204,7 +204,7 @@
 		"GetPermissions",
 		SetPermissionsStimulus{
 			fun: "SetPermissions",
-			acl: access.Permissions{
+			perms: access.Permissions{
 				"Admin": access.AccessList{
 					In:    []security.BlessingPattern{"friends", "self"},
 					NotIn: []string{"friends/alice"},
@@ -231,14 +231,14 @@
 
 	// GetPermissions fails.
 	rootTape.SetResponses([]interface{}{GetPermissionsResponse{
-		acl:     access.Permissions{},
+		perms:   access.Permissions{},
 		version: "aVersionForToday",
 		err:     verror.New(errOops, nil),
 	},
 	})
 
 	if err := cmd.Execute([]string{"acl", "set", deviceName, "vana/bad", "Read"}); err == nil {
-		t.Fatalf("GetPermissions RPC inside acl set command failed but error wrongly not detected")
+		t.Fatalf("GetPermissions RPC inside perms set command failed but error wrongly not detected")
 	} else if expected, got := `^GetPermissions\(`+deviceName+`\) failed:.*oops!`, err.Error(); !regexp.MustCompile(expected).MatchString(got) {
 		t.Fatalf("Unexpected output from list. Got %q, regexp %q", got, expected)
 	}
@@ -258,7 +258,7 @@
 
 	// SetPermissions fails with something other than a bad version failure.
 	rootTape.SetResponses([]interface{}{GetPermissionsResponse{
-		acl: access.Permissions{
+		perms: access.Permissions{
 			"Read": access.AccessList{
 				In: []security.BlessingPattern{"other", "self"},
 			},
@@ -282,7 +282,7 @@
 		"GetPermissions",
 		SetPermissionsStimulus{
 			fun: "SetPermissions",
-			acl: access.Permissions{
+			perms: access.Permissions{
 				"Read": access.AccessList{
 					In:    []security.BlessingPattern{"friend", "other", "self"},
 					NotIn: []string(nil),
diff --git a/services/device/device/devicemanager_mock_test.go b/services/device/device/devicemanager_mock_test.go
index 18d7e7d..81d4544 100644
--- a/services/device/device/devicemanager_mock_test.go
+++ b/services/device/device/devicemanager_mock_test.go
@@ -237,27 +237,27 @@
 
 func (*mockDeviceInvoker) UpdateTo(*context.T, rpc.ServerCall, string) error { return nil }
 
-// Mock AccessList getting and setting
+// Mock Permissions getting and setting
 type GetPermissionsResponse struct {
-	acl     access.Permissions
+	perms   access.Permissions
 	version string
 	err     error
 }
 
 type SetPermissionsStimulus struct {
 	fun     string
-	acl     access.Permissions
+	perms   access.Permissions
 	version string
 }
 
-func (mdi *mockDeviceInvoker) SetPermissions(_ *context.T, _ rpc.ServerCall, acl access.Permissions, version string) error {
-	return mdi.simpleCore(SetPermissionsStimulus{"SetPermissions", acl, version}, "SetPermissions")
+func (mdi *mockDeviceInvoker) SetPermissions(_ *context.T, _ rpc.ServerCall, perms access.Permissions, version string) error {
+	return mdi.simpleCore(SetPermissionsStimulus{"SetPermissions", perms, version}, "SetPermissions")
 }
 
 func (mdi *mockDeviceInvoker) GetPermissions(*context.T, rpc.ServerCall) (access.Permissions, string, error) {
 	ir := mdi.tape.Record("GetPermissions")
 	r := ir.(GetPermissionsResponse)
-	return r.acl, r.version, r.err
+	return r.perms, r.version, r.err
 }
 
 func (mdi *mockDeviceInvoker) Debug(*context.T, rpc.ServerCall) (string, error) {
diff --git a/services/device/device/doc.go b/services/device/device/doc.go
index 706c6f3..fd9111e 100644
--- a/services/device/device/doc.go
+++ b/services/device/device/doc.go
@@ -28,7 +28,7 @@
    updateall     Update all installations/instances of an application
    status        Get application status.
    debug         Debug the device.
-   acl           Tool for setting device manager AccessLists
+   acl           Tool for setting device manager Permissions
    publish       Publish the given application(s).
    help          Display help for commands or topics
 Run "device help [command]" for command usage.
@@ -71,9 +71,9 @@
  -v23.namespace.root=[/(dev.v.io/role/vprod/service/mounttabled)@ns.dev.v.io:8101]
    local namespace root; can be repeated to provided multiple roots
  -v23.permissions.file=map[]
-   specify an acl file as <name>:<aclfile>
+   specify a perms file as <name>:<permsfile>
  -v23.permissions.literal=
-   explicitly specify the runtime acl as a JSON-encoded access.Permissions.
+   explicitly specify the runtime perms as a JSON-encoded access.Permissions.
    Overrides all --v23.permissions.file flags.
  -v23.proxy=
    object name of proxy service to use to export services across network
@@ -321,19 +321,19 @@
 
 Device Acl
 
-The acl tool manages AccessLists on the device manger, installations and
+The acl tool manages Permissions on the device manger, installations and
 instances.
 
 Usage:
    device acl <command>
 
 The device acl commands are:
-   get         Get AccessLists for the given target.
-   set         Set AccessLists for the given target.
+   get         Get Permissions for the given target.
+   set         Set Permissions for the given target.
 
 Device Acl Get
 
-Get AccessLists for the given target.
+Get Permissions for the given target.
 
 Usage:
    device acl get <device manager name>
@@ -343,7 +343,7 @@
 
 Device Acl Set
 
-Set AccessLists for the given target
+Set Permissions for the given target
 
 Usage:
    device acl set [flags] <device manager name>  (<blessing> [!]<tag>(,[!]<tag>)*
diff --git a/services/device/device/local_install.go b/services/device/device/local_install.go
index dae431f..f2a3243 100644
--- a/services/device/device/local_install.go
+++ b/services/device/device/local_install.go
@@ -200,11 +200,11 @@
 	return errNotImplemented
 }
 
-func (binaryInvoker) GetPermissions(*context.T, rpc.ServerCall) (acl access.Permissions, version string, err error) {
+func (binaryInvoker) GetPermissions(*context.T, rpc.ServerCall) (perms access.Permissions, version string, err error) {
 	return nil, "", errNotImplemented
 }
 
-func (binaryInvoker) SetPermissions(_ *context.T, _ rpc.ServerCall, acl access.Permissions, version string) error {
+func (binaryInvoker) SetPermissions(_ *context.T, _ rpc.ServerCall, perms access.Permissions, version string) error {
 	return errNotImplemented
 }
 
@@ -213,7 +213,8 @@
 func (i envelopeInvoker) Match(*context.T, rpc.ServerCall, []string) (application.Envelope, error) {
 	return application.Envelope(i), nil
 }
-func (envelopeInvoker) GetPermissions(*context.T, rpc.ServerCall) (acl access.Permissions, version string, err error) {
+
+func (envelopeInvoker) GetPermissions(*context.T, rpc.ServerCall) (perms access.Permissions, version string, err error) {
 	return nil, "", errNotImplemented
 }
 
diff --git a/services/device/device/publish.go b/services/device/device/publish.go
index ad62461..7412cda 100644
--- a/services/device/device/publish.go
+++ b/services/device/device/publish.go
@@ -57,21 +57,21 @@
 	if readBlessings == "" {
 		return nil
 	}
-	acl, version, err := permissions.ObjectClient(von).GetPermissions(gctx)
+	perms, version, err := permissions.ObjectClient(von).GetPermissions(gctx)
 	if err != nil {
 		// TODO(caprita): This is a workaround until we sort out the
 		// default AccessLists for applicationd (see issue #1317).  At that
 		// time, uncomment the line below.
 		//
 		//   return err
-		acl = make(access.Permissions)
+		perms = make(access.Permissions)
 	}
 	for _, blessing := range strings.Split(readBlessings, ",") {
 		for _, tag := range []access.Tag{access.Read, access.Resolve} {
-			acl.Add(security.BlessingPattern(blessing), string(tag))
+			perms.Add(security.BlessingPattern(blessing), string(tag))
 		}
 	}
-	if err := permissions.ObjectClient(von).SetPermissions(gctx, acl, version); err != nil {
+	if err := permissions.ObjectClient(von).SetPermissions(gctx, perms, version); err != nil {
 		return err
 	}
 	fmt.Fprintf(cmd.Stdout(), "Added patterns %q to Read,Resolve AccessList for %q\n", readBlessings, von)
@@ -92,7 +92,7 @@
 	}
 	fmt.Fprintf(cmd.Stdout(), "Binary %q uploaded from file %s\n", binaryVON, binaryFile)
 
-	// Step 2, set the acls for the uploaded binary.
+	// Step 2, set the perms for the uploaded binary.
 
 	if err := setAccessLists(cmd, binaryVON); err != nil {
 		return err
@@ -123,7 +123,7 @@
 	}
 	fmt.Fprintf(cmd.Stdout(), "Published %q\n", appVON)
 
-	// Step 4, set the acls for the uploaded envelope.
+	// Step 4, set the perms for the uploaded envelope.
 
 	if err := setAccessLists(cmd, appVON); err != nil {
 		return err
diff --git a/services/device/deviced/server.go b/services/device/deviced/server.go
index 95b7068..052e0fe 100644
--- a/services/device/deviced/server.go
+++ b/services/device/deviced/server.go
@@ -66,9 +66,9 @@
 		vlog.Errorf("Failed to load config passed from parent: %v", err)
 		return err
 	}
-	mtAclDir := filepath.Join(configState.Root, "mounttable")
-	if err := os.MkdirAll(mtAclDir, 0700); err != nil {
-		vlog.Errorf("os.MkdirAll(%q) failed: %v", mtAclDir, err)
+	mtPermsDir := filepath.Join(configState.Root, "mounttable")
+	if err := os.MkdirAll(mtPermsDir, 0700); err != nil {
+		vlog.Errorf("os.MkdirAll(%q) failed: %v", mtPermsDir, err)
 		return err
 	}
 
@@ -76,7 +76,7 @@
 	// setting and getting of exitErr.
 	var exitErr error
 	ns := starter.NamespaceArgs{
-		AccessListFile: filepath.Join(mtAclDir, "acls"),
+		PermissionsFile: filepath.Join(mtPermsDir, "acls"),
 	}
 	if testMode {
 		ns.ListenSpec = rpc.ListenSpec{Addrs: rpc.ListenAddrs{{"tcp", "127.0.0.1:0"}}}
diff --git a/services/device/internal/impl/acl_propagator.go b/services/device/internal/impl/acl_propagator.go
deleted file mode 100644
index 37cfa38..0000000
--- a/services/device/internal/impl/acl_propagator.go
+++ /dev/null
@@ -1,45 +0,0 @@
-// Copyright 2015 The Vanadium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style
-// license that can be found in the LICENSE file.
-
-package impl
-
-import (
-	"path/filepath"
-
-	"v.io/v23/security"
-	"v.io/v23/security/access"
-
-	"v.io/x/ref/services/internal/acls"
-)
-
-// computePath builds the desired path for the debug acls.
-func computePath(path string) string {
-	return filepath.Join(path, "debugacls")
-}
-
-// setACLsForDebugging constructs an ACL file for use by applications that
-// permits principals with a Debug right on an application instance to
-// access names in the app's __debug space.
-func setACLsForDebugging(blessings []string, acl access.Permissions, instancePath string, aclstore *acls.PathStore) error {
-	path := computePath(instancePath)
-	newACL := make(access.Permissions)
-
-	// Add blessings for the DM so that it can access the app too.
-
-	set := func(bl security.BlessingPattern) {
-		for _, tag := range []access.Tag{access.Resolve, access.Debug} {
-			newACL.Add(bl, string(tag))
-		}
-	}
-
-	for _, b := range blessings {
-		set(security.BlessingPattern(b))
-	}
-
-	// add Resolve for every blessing that has debug
-	for _, v := range acl["Debug"].In {
-		set(v)
-	}
-	return aclstore.Set(path, newACL, "")
-}
diff --git a/services/device/internal/impl/app_service.go b/services/device/internal/impl/app_service.go
index 4307bb6..ad6c452 100644
--- a/services/device/internal/impl/app_service.go
+++ b/services/device/internal/impl/app_service.go
@@ -54,13 +54,13 @@
 //             data(700d)                 - the AccessLists for this instance. These
 //                                          AccessLists control access to Run,
 //                                          Kill and Delete.
-//             signature(700d)            - the signature for  these AccessLists.
+//             signature(700d)            - the signature for these AccessLists.
 //           <status>(700d)               - one of the values for InstanceState enum
 //           systemname(700d)             - the system name used to execute this instance
 //           debugacls (711d)/
-//             data(644)/                 - the ACLs for Debug access to the application. Shared
+//             data(644)/                 - the Permissions for Debug access to the application. Shared
 //                                          with the application.
-//             signature(644)/            - the signature for these ACLs.
+//             signature(644)/            - the signature for these Permissions.
 //         instance-<id b>(711d)
 //         ...
 //     installation-<id 2>(711d)
@@ -150,8 +150,8 @@
 	"v.io/x/ref/services/agent/agentlib"
 	"v.io/x/ref/services/agent/keymgr"
 	"v.io/x/ref/services/device/internal/config"
-	"v.io/x/ref/services/internal/acls"
 	"v.io/x/ref/services/internal/packages"
+	"v.io/x/ref/services/internal/pathperms"
 )
 
 // instanceInfo holds state about a running instance.
@@ -197,9 +197,9 @@
 	// suffix contains the name components of the current invocation name
 	// suffix.  It is used to identify an application, installation, or
 	// instance.
-	suffix   []string
-	uat      BlessingSystemAssociationStore
-	aclstore *acls.PathStore
+	suffix     []string
+	uat        BlessingSystemAssociationStore
+	permsStore *pathperms.PathStore
 	// Reference to the devicemanager top-level AccessList list.
 	deviceAccessList access.Permissions
 	// securityAgent holds state related to the security agent (nil if not
@@ -649,16 +649,17 @@
 	return installFrom(overridePackages, installationDir)
 }
 
-// initializeSubAccessLists updates the provided acl for instance-specific ACLs
-func (i *appService) initializeSubAccessLists(instanceDir string, blessings []string, acl access.Permissions) error {
+// initializeSubAccessLists updates the provided perms for instance-specific
+// Permissions.
+func (i *appService) initializeSubAccessLists(instanceDir string, blessings []string, perms access.Permissions) error {
 	for _, b := range blessings {
 		b = b + string(security.ChainSeparator) + string(security.NoExtension)
 		for _, tag := range access.AllTypicalTags() {
-			acl.Add(security.BlessingPattern(b), string(tag))
+			perms.Add(security.BlessingPattern(b), string(tag))
 		}
 	}
-	aclDir := path.Join(instanceDir, "acls")
-	return i.aclstore.Set(aclDir, acl, "")
+	permsDir := path.Join(instanceDir, "acls")
+	return i.permsStore.Set(permsDir, perms, "")
 }
 
 func (i *appService) newInstance(ctx *context.T, call device.ApplicationInstantiateServerCall) (string, string, error) {
@@ -704,8 +705,8 @@
 		return instanceDir, instanceID, err
 	}
 	blessings, _ := security.RemoteBlessingNames(ctx, call.Security())
-	aclCopy := i.deviceAccessList.Copy()
-	if err := i.initializeSubAccessLists(instanceDir, blessings, aclCopy); err != nil {
+	permsCopy := i.deviceAccessList.Copy()
+	if err := i.initializeSubAccessLists(instanceDir, blessings, permsCopy); err != nil {
 		return instanceDir, instanceID, err
 	}
 	if err := initializeInstance(instanceDir, device.InstanceStateNotRunning); err != nil {
@@ -714,7 +715,7 @@
 	// TODO(rjkroege): Divide the permission lists into those used by the device manager
 	// and those used by the application itself.
 	dmBlessings := security.LocalBlessingNames(ctx, call.Security())
-	if err := setACLsForDebugging(dmBlessings, aclCopy, instanceDir, i.aclstore); err != nil {
+	if err := setPermsForDebugging(dmBlessings, permsCopy, instanceDir, i.permsStore); err != nil {
 		return instanceDir, instanceID, err
 	}
 	return instanceDir, instanceID, nil
@@ -809,8 +810,8 @@
 	cfg.Set(mgmt.AddressConfigKey, "127.0.0.1:0")
 	cfg.Set(mgmt.ParentBlessingConfigKey, info.DeviceManagerPeerPattern)
 
-	appAclDir := filepath.Join(instanceDir, "debugacls", "data")
-	cfg.Set("v23.permissions.file", "runtime:"+appAclDir)
+	appPermsDir := filepath.Join(instanceDir, "debugacls", "data")
+	cfg.Set("v23.permissions.file", "runtime:"+appPermsDir)
 
 	// This adds to cmd.Extrafiles. The helper expects a fixed fd, so this call needs
 	// to go before anything that conditionally adds to Extrafiles, like the agent
@@ -1299,26 +1300,26 @@
 }
 
 // TODO(rjkroege): Consider maintaining an in-memory Permissions cache.
-func (i *appService) SetPermissions(ctx *context.T, call rpc.ServerCall, acl access.Permissions, version string) error {
+func (i *appService) SetPermissions(ctx *context.T, call rpc.ServerCall, perms access.Permissions, version string) error {
 	dir, isInstance, err := dirFromSuffix(i.suffix, i.config.Root)
 	if err != nil {
 		return err
 	}
 	if isInstance {
 		dmBlessings := security.LocalBlessingNames(ctx, call.Security())
-		if err := setACLsForDebugging(dmBlessings, acl, dir, i.aclstore); err != nil {
+		if err := setPermsForDebugging(dmBlessings, perms, dir, i.permsStore); err != nil {
 			return err
 		}
 	}
-	return i.aclstore.Set(path.Join(dir, "acls"), acl, version)
+	return i.permsStore.Set(path.Join(dir, "acls"), perms, version)
 }
 
-func (i *appService) GetPermissions(*context.T, rpc.ServerCall) (acl access.Permissions, version string, err error) {
+func (i *appService) GetPermissions(*context.T, rpc.ServerCall) (perms access.Permissions, version string, err error) {
 	dir, _, err := dirFromSuffix(i.suffix, i.config.Root)
 	if err != nil {
 		return nil, "", err
 	}
-	return i.aclstore.Get(path.Join(dir, "acls"))
+	return i.permsStore.Get(path.Join(dir, "acls"))
 }
 
 func (i *appService) Debug(ctx *context.T, call rpc.ServerCall) (string, error) {
diff --git a/services/device/internal/impl/claim.go b/services/device/internal/impl/claim.go
index 474507b..10133ea 100644
--- a/services/device/internal/impl/claim.go
+++ b/services/device/internal/impl/claim.go
@@ -15,7 +15,7 @@
 	"v.io/v23/security/access"
 	"v.io/v23/verror"
 	"v.io/x/lib/vlog"
-	"v.io/x/ref/services/internal/acls"
+	"v.io/x/ref/services/internal/pathperms"
 )
 
 // claimable implements the device.Claimable RPC interface and the
@@ -23,10 +23,10 @@
 //
 // It allows the Claim RPC to be successfully invoked exactly once.
 type claimable struct {
-	token    string
-	aclstore *acls.PathStore
-	aclDir   string
-	notify   chan struct{} // GUARDED_BY(mu)
+	token      string
+	permsStore *pathperms.PathStore
+	permsDir   string
+	notify     chan struct{} // GUARDED_BY(mu)
 
 	// Lock used to ensure that a successful claim can happen at most once.
 	// This is done by allowing only a single goroutine to execute the
@@ -66,30 +66,30 @@
 		return verror.New(ErrInvalidBlessing, ctx, err)
 	}
 
-	// Create an AccessList with all the granted blessings (which are now the default blessings)
+	// Create Permissions with all the granted blessings (which are now the default blessings)
 	// (irrespective of caveats).
 	patterns := security.DefaultBlessingPatterns(principal)
 	if len(patterns) == 0 {
 		return verror.New(ErrInvalidBlessing, ctx)
 	}
 
-	// Create AccessLists that allow principals with the caller's blessings to
+	// Create Permissions that allow principals with the caller's blessings to
 	// administer and use the device.
-	acl := make(access.Permissions)
+	perms := make(access.Permissions)
 	for _, bp := range patterns {
 		// TODO(caprita,ataly,ashankar): Do we really need the
 		// NonExtendable restriction below?
 		patterns := bp.MakeNonExtendable().PrefixPatterns()
 		for _, p := range patterns {
 			for _, tag := range access.AllTypicalTags() {
-				acl.Add(p, string(tag))
+				perms.Add(p, string(tag))
 			}
 		}
 	}
-	if err := c.aclstore.Set(c.aclDir, acl, ""); err != nil {
+	if err := c.permsStore.Set(c.permsDir, perms, ""); err != nil {
 		return verror.New(ErrOperationFailed, ctx)
 	}
-	vlog.Infof("Device claimed and AccessLists set to: %v", acl)
+	vlog.Infof("Device claimed and Permissions set to: %v", perms)
 	close(c.notify)
 	c.notify = nil
 	return nil
diff --git a/services/device/internal/impl/debug_acls_test.go b/services/device/internal/impl/debug_perms_test.go
similarity index 97%
rename from services/device/internal/impl/debug_acls_test.go
rename to services/device/internal/impl/debug_perms_test.go
index 79f6c6d..5179c07 100644
--- a/services/device/internal/impl/debug_acls_test.go
+++ b/services/device/internal/impl/debug_perms_test.go
@@ -22,12 +22,12 @@
 
 func updateAccessList(t *testing.T, ctx *context.T, blessing, right string, name ...string) {
 	accessStub := permissions.ObjectClient(naming.Join(name...))
-	acl, version, err := accessStub.GetPermissions(ctx)
+	perms, version, err := accessStub.GetPermissions(ctx)
 	if err != nil {
 		t.Fatalf(testutil.FormatLogLine(2, "GetPermissions(%v) failed %v", name, err))
 	}
-	acl.Add(security.BlessingPattern(blessing), right)
-	if err = accessStub.SetPermissions(ctx, acl, version); err != nil {
+	perms.Add(security.BlessingPattern(blessing), right)
+	if err = accessStub.SetPermissions(ctx, perms, version); err != nil {
 		t.Fatalf(testutil.FormatLogLine(2, "SetPermissions(%v, %v, %v) failed: %v", name, blessing, right, err))
 	}
 }
@@ -158,7 +158,7 @@
 	verifyGlob(t, hjCtx, "app", globtestminus, res)
 	verifyStatsValues(t, hjCtx, "appV1", "__debug", "stats/system/start-time*")
 
-	// Alice might be able to help but Bob didn't give Alice access to the debug ACLs.
+	// Alice might be able to help but Bob didn't give Alice access to the debug Permissionss.
 	testAccessFail(t, verror.ErrNoAccess.ID, aliceCtx, "Alice", "dm", "apps", appID, bobApp, "stats/system/pid")
 
 	// Bob forgets that Alice can't read the stats when he can.
diff --git a/services/device/internal/impl/device_service.go b/services/device/internal/impl/device_service.go
index fb35fa2..5235290 100644
--- a/services/device/internal/impl/device_service.go
+++ b/services/device/internal/impl/device_service.go
@@ -24,7 +24,7 @@
 //       acls/
 //         data
 //         signature
-//	 associated.accounts
+//     associated.accounts
 //       persistent-args       - list of persistent arguments for the device
 //                               manager (json encoded)
 //
@@ -615,14 +615,14 @@
 	return nil
 }
 
-func (s *deviceService) SetPermissions(_ *context.T, _ rpc.ServerCall, acl access.Permissions, version string) error {
-	d := AclDir(s.disp.config)
-	return s.disp.aclstore.Set(d, acl, version)
+func (s *deviceService) SetPermissions(_ *context.T, _ rpc.ServerCall, perms access.Permissions, version string) error {
+	d := PermsDir(s.disp.config)
+	return s.disp.permsStore.Set(d, perms, version)
 }
 
-func (s *deviceService) GetPermissions(*context.T, rpc.ServerCall) (acl access.Permissions, version string, err error) {
-	d := AclDir(s.disp.config)
-	return s.disp.aclstore.Get(d)
+func (s *deviceService) GetPermissions(*context.T, rpc.ServerCall) (perms access.Permissions, version string, err error) {
+	d := PermsDir(s.disp.config)
+	return s.disp.permsStore.Get(d)
 }
 
 // TODO(rjkroege): Make it possible for users on the same system to also
diff --git a/services/device/internal/impl/dispatcher.go b/services/device/internal/impl/dispatcher.go
index d649d84..7e2f25c 100644
--- a/services/device/internal/impl/dispatcher.go
+++ b/services/device/internal/impl/dispatcher.go
@@ -29,8 +29,8 @@
 	"v.io/x/ref/services/agent/keymgr"
 	s_device "v.io/x/ref/services/device"
 	"v.io/x/ref/services/device/internal/config"
-	"v.io/x/ref/services/internal/acls"
 	"v.io/x/ref/services/internal/logreaderlib"
+	"v.io/x/ref/services/internal/pathperms"
 )
 
 // internalState wraps state shared between different device manager
@@ -53,8 +53,8 @@
 	// dispatcher methods.
 	mu sync.RWMutex
 	// TODO(rjkroege): Consider moving this inside internal.
-	uat      BlessingSystemAssociationStore
-	aclstore *acls.PathStore
+	uat        BlessingSystemAssociationStore
+	permsStore *pathperms.PathStore
 	// Namespace
 	mtAddress string // The address of the local mounttable.
 	// reap is the app process monitoring subsystem.
@@ -96,21 +96,21 @@
 // It returns (nil, nil) if the device is no longer claimable.
 func NewClaimableDispatcher(ctx *context.T, config *config.State, pairingToken string) (rpc.Dispatcher, <-chan struct{}) {
 	var (
-		aclDir   = AclDir(config)
-		aclstore = acls.NewPathStore(v23.GetPrincipal(ctx))
+		permsDir   = PermsDir(config)
+		permsStore = pathperms.NewPathStore(v23.GetPrincipal(ctx))
 	)
-	if _, _, err := aclstore.Get(aclDir); !os.IsNotExist(err) {
+	if _, _, err := permsStore.Get(permsDir); !os.IsNotExist(err) {
 		return nil, nil
 	}
 	// The device is claimable only if Claim hasn't been called before. The
-	// existence of the AccessList file is an indication of a successful prior
+	// existence of the Permissions file is an indication of a successful prior
 	// call to Claim.
 	notify := make(chan struct{})
-	return &claimable{token: pairingToken, aclstore: aclstore, aclDir: aclDir, notify: notify}, notify
+	return &claimable{token: pairingToken, permsStore: permsStore, permsDir: permsDir, notify: notify}, notify
 }
 
 // NewDispatcher is the device manager dispatcher factory.
-func NewDispatcher(ctx *context.T, config *config.State, mtAddress string, testMode bool, restartHandler func(), permStore *acls.PathStore) (rpc.Dispatcher, error) {
+func NewDispatcher(ctx *context.T, config *config.State, mtAddress string, testMode bool, restartHandler func(), permStore *pathperms.PathStore) (rpc.Dispatcher, error) {
 	if err := config.Validate(); err != nil {
 		return nil, verror.New(errInvalidConfig, ctx, config, err)
 	}
@@ -130,11 +130,11 @@
 			restartHandler: restartHandler,
 			testMode:       testMode,
 		},
-		config:    config,
-		uat:       uat,
-		aclstore:  permStore,
-		mtAddress: mtAddress,
-		reap:      reap,
+		config:     config,
+		uat:        uat,
+		permsStore: permStore,
+		mtAddress:  mtAddress,
+		reap:       reap,
 	}
 
 	// If we're in 'security agent mode', set up the key manager agent.
@@ -231,15 +231,15 @@
 	return loggingInvoker, auth, nil
 }
 
-func newTestableHierarchicalAuth(testMode bool, rootDir, childDir string, get acls.TAMGetter) (security.Authorizer, error) {
+func newTestableHierarchicalAuth(testMode bool, rootDir, childDir string, get pathperms.PermsGetter) (security.Authorizer, error) {
 	if testMode {
-		// In test mode, the device manager will not be able to read
-		// the AccessLists, because they were signed with the key of the real
-		// device manager. It's not a problem because the
-		// testModeDispatcher overrides the authorizer anyway.
+		// In test mode, the device manager will not be able to read the
+		// Permissions, because they were signed with the key of the real device
+		// manager. It's not a problem because the testModeDispatcher overrides the
+		// authorizer anyway.
 		return nil, nil
 	}
-	return acls.NewHierarchicalAuthorizer(rootDir, childDir, get)
+	return pathperms.NewHierarchicalAuthorizer(rootDir, childDir, get)
 }
 
 func (d *dispatcher) internalLookup(suffix string) (interface{}, security.Authorizer, error) {
@@ -251,10 +251,9 @@
 		}
 	}
 
-	// TODO(rjkroege): Permit the root AccessLists to diverge for the
-	// device and app sub-namespaces of the device manager after
-	// claiming.
-	auth, err := newTestableHierarchicalAuth(d.internal.testMode, AclDir(d.config), AclDir(d.config), d.aclstore)
+	// TODO(rjkroege): Permit the root Permissions to diverge for the device and
+	// app sub-namespaces of the device manager after claiming.
+	auth, err := newTestableHierarchicalAuth(d.internal.testMode, PermsDir(d.config), PermsDir(d.config), d.permsStore)
 	if err != nil {
 		return nil, nil, err
 	}
@@ -291,7 +290,7 @@
 			case "logs":
 				logsDir := filepath.Join(appInstanceDir, "logs")
 				suffix := naming.Join(components[5:]...)
-				appSpecificAuthorizer, err := newAppSpecificAuthorizer(auth, d.config, components[1:], d.aclstore)
+				appSpecificAuthorizer, err := newAppSpecificAuthorizer(auth, d.config, components[1:], d.permsStore)
 				if err != nil {
 					return nil, nil, err
 				}
@@ -315,7 +314,7 @@
 				remote := naming.JoinAddressName(info.AppCycleMgrName, suffix)
 
 				// Use hierarchical auth with debugacls under debug access.
-				appSpecificAuthorizer, err := newAppSpecificAuthorizer(auth, d.config, components[1:], d.aclstore)
+				appSpecificAuthorizer, err := newAppSpecificAuthorizer(auth, d.config, components[1:], d.permsStore)
 				if err != nil {
 					return nil, nil, err
 				}
@@ -327,12 +326,12 @@
 			config:        d.config,
 			suffix:        components[1:],
 			uat:           d.uat,
-			aclstore:      d.aclstore,
+			permsStore:    d.permsStore,
 			securityAgent: d.internal.securityAgent,
 			mtAddress:     d.mtAddress,
 			reap:          d.reap,
 		})
-		appSpecificAuthorizer, err := newAppSpecificAuthorizer(auth, d.config, components[1:], d.aclstore)
+		appSpecificAuthorizer, err := newAppSpecificAuthorizer(auth, d.config, components[1:], d.permsStore)
 		if err != nil {
 			return nil, nil, err
 		}
@@ -379,35 +378,35 @@
 	return verror.New(ErrInvalidSuffix, nil)
 }
 
-func newAppSpecificAuthorizer(sec security.Authorizer, config *config.State, suffix []string, getter acls.TAMGetter) (security.Authorizer, error) {
+func newAppSpecificAuthorizer(sec security.Authorizer, config *config.State, suffix []string, getter pathperms.PermsGetter) (security.Authorizer, error) {
 	// TODO(rjkroege): This does not support <appname>.Start() to start all
 	// instances. Correct this.
 
-	// If we are attempting a method invocation against "apps/", we use
-	// the root AccessList.
+	// If we are attempting a method invocation against "apps/", we use the root
+	// Permissions.
 	if len(suffix) == 0 || len(suffix) == 1 {
 		return sec, nil
 	}
-	// Otherwise, we require a per-installation and per-instance AccessList file.
+	// Otherwise, we require a per-installation and per-instance Permissions file.
 	if len(suffix) == 2 {
 		p, err := installationDirCore(suffix, config.Root)
 		if err != nil {
 			return nil, verror.New(ErrOperationFailed, nil, fmt.Sprintf("newAppSpecificAuthorizer failed: %v", err))
 		}
-		return acls.NewHierarchicalAuthorizer(AclDir(config), path.Join(p, "acls"), getter)
+		return pathperms.NewHierarchicalAuthorizer(PermsDir(config), path.Join(p, "acls"), getter)
 	}
-	// Use the special debugacls for instance/logs, instance/pprof, instance//stats.
+	// Use the special debugacls for instance/logs, instance/pprof, instance/stats.
 	if len(suffix) > 3 && (suffix[3] == "logs" || suffix[3] == "pprof" || suffix[3] == "stats") {
 		p, err := instanceDir(config.Root, suffix[0:3])
 		if err != nil {
 			return nil, verror.New(ErrOperationFailed, nil, fmt.Sprintf("newAppSpecificAuthorizer failed: %v", err))
 		}
-		return acls.NewHierarchicalAuthorizer(AclDir(config), path.Join(p, "debugacls"), getter)
+		return pathperms.NewHierarchicalAuthorizer(PermsDir(config), path.Join(p, "debugacls"), getter)
 	}
 
 	p, err := instanceDir(config.Root, suffix[0:3])
 	if err != nil {
 		return nil, verror.New(ErrOperationFailed, nil, fmt.Sprintf("newAppSpecificAuthorizer failed: %v", err))
 	}
-	return acls.NewHierarchicalAuthorizer(AclDir(config), path.Join(p, "acls"), getter)
+	return pathperms.NewHierarchicalAuthorizer(PermsDir(config), path.Join(p, "acls"), getter)
 }
diff --git a/services/device/internal/impl/impl_test.go b/services/device/internal/impl/impl_test.go
index 24a8a4d..91718af 100644
--- a/services/device/internal/impl/impl_test.go
+++ b/services/device/internal/impl/impl_test.go
@@ -1073,12 +1073,12 @@
 	// manager version.
 	md5hash := md5.Sum(b.Bytes())
 	expectedVersion := hex.EncodeToString(md5hash[:])
-	acl, version, err := deviceStub.GetPermissions(selfCtx)
+	perms, version, err := deviceStub.GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatal(err)
 	}
 	if version != expectedVersion {
-		t.Fatalf("getAccessList expected:%v(%v), got:%v(%v)", expectedAccessList, expectedVersion, acl, version)
+		t.Fatalf("getAccessList expected:%v(%v), got:%v(%v)", expectedAccessList, expectedVersion, perms, version)
 	}
 	// Install from octx should fail, since it does not match the AccessList.
 	installAppExpectError(t, octx, verror.ErrNoAccess.ID)
@@ -1568,7 +1568,7 @@
 	appID := installApp(t, selfCtx)
 
 	vlog.VI(2).Infof("Validate that the created app has the right permission lists.")
-	acl, _, err := appStub(appID).GetPermissions(selfCtx)
+	perms, _, err := appStub(appID).GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions on appID: %v failed %v", appID, err)
 	}
@@ -1576,7 +1576,7 @@
 	for _, tag := range access.AllTypicalTags() {
 		expected[string(tag)] = access.AccessList{In: []security.BlessingPattern{"root/self/$"}}
 	}
-	if got, want := acl.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
+	if got, want := perms.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
 		t.Errorf("got %#v, expected %#v", got, want)
 	}
 
@@ -1637,11 +1637,11 @@
 	for _, tag := range access.AllTypicalTags() {
 		expected[string(tag)] = access.AccessList{In: []security.BlessingPattern{"root/other/$"}}
 	}
-	acl, _, err = appStub(appID, instance2ID).GetPermissions(selfCtx)
+	perms, _, err = appStub(appID, instance2ID).GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions on instance %v/%v failed: %v", appID, instance2ID, err)
 	}
-	if got, want := acl.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
+	if got, want := perms.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
 		t.Errorf("got %#v, expected %#v ", got, want)
 	}
 
diff --git a/services/device/internal/impl/mock_repo_test.go b/services/device/internal/impl/mock_repo_test.go
index 987a086..7f6a03d 100644
--- a/services/device/internal/impl/mock_repo_test.go
+++ b/services/device/internal/impl/mock_repo_test.go
@@ -77,11 +77,11 @@
 	return i.envelope, nil
 }
 
-func (i *arInvoker) GetPermissions(*context.T, rpc.ServerCall) (acl access.Permissions, version string, err error) {
+func (i *arInvoker) GetPermissions(*context.T, rpc.ServerCall) (perms access.Permissions, version string, err error) {
 	return nil, "", nil
 }
 
-func (i *arInvoker) SetPermissions(_ *context.T, _ rpc.ServerCall, acl access.Permissions, version string) error {
+func (i *arInvoker) SetPermissions(_ *context.T, _ rpc.ServerCall, perms access.Permissions, version string) error {
 	return nil
 }
 
@@ -171,10 +171,10 @@
 	return nil
 }
 
-func (i *brInvoker) GetPermissions(*context.T, rpc.ServerCall) (acl access.Permissions, version string, err error) {
+func (i *brInvoker) GetPermissions(*context.T, rpc.ServerCall) (perms access.Permissions, version string, err error) {
 	return nil, "", nil
 }
 
-func (i *brInvoker) SetPermissions(_ *context.T, _ rpc.ServerCall, acl access.Permissions, version string) error {
+func (i *brInvoker) SetPermissions(_ *context.T, _ rpc.ServerCall, perms access.Permissions, version string) error {
 	return nil
 }
diff --git a/services/device/internal/impl/perms_propagator.go b/services/device/internal/impl/perms_propagator.go
new file mode 100644
index 0000000..ef3c0d1
--- /dev/null
+++ b/services/device/internal/impl/perms_propagator.go
@@ -0,0 +1,44 @@
+// Copyright 2015 The Vanadium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style
+// license that can be found in the LICENSE file.
+
+package impl
+
+import (
+	"path/filepath"
+
+	"v.io/v23/security"
+	"v.io/v23/security/access"
+	"v.io/x/ref/services/internal/pathperms"
+)
+
+// computePath builds the desired path for the debug perms.
+func computePath(path string) string {
+	return filepath.Join(path, "debugacls")
+}
+
+// setPermsForDebugging constructs a Permissions file for use by applications
+// that permits principals with a Debug right on an application instance to
+// access names in the app's __debug space.
+func setPermsForDebugging(blessings []string, perms access.Permissions, instancePath string, permsStore *pathperms.PathStore) error {
+	path := computePath(instancePath)
+	newPerms := make(access.Permissions)
+
+	// Add blessings for the DM so that it can access the app too.
+
+	set := func(bl security.BlessingPattern) {
+		for _, tag := range []access.Tag{access.Resolve, access.Debug} {
+			newPerms.Add(bl, string(tag))
+		}
+	}
+
+	for _, b := range blessings {
+		set(security.BlessingPattern(b))
+	}
+
+	// add Resolve for every blessing that has debug
+	for _, v := range perms["Debug"].In {
+		set(v)
+	}
+	return permsStore.Set(path, newPerms, "")
+}
diff --git a/services/device/internal/impl/util.go b/services/device/internal/impl/util.go
index ce8ba53..dd22307 100644
--- a/services/device/internal/impl/util.go
+++ b/services/device/internal/impl/util.go
@@ -146,7 +146,7 @@
 	}
 }
 
-func AclDir(c *config.State) string {
+func PermsDir(c *config.State) string {
 	return filepath.Join(c.Root, "device-manager", "device-data", "acls")
 }
 
diff --git a/services/device/internal/starter/starter.go b/services/device/internal/starter/starter.go
index 4c059f9..9ea7dba 100644
--- a/services/device/internal/starter/starter.go
+++ b/services/device/internal/starter/starter.go
@@ -19,7 +19,7 @@
 	"v.io/x/ref/services/debug/debuglib"
 	"v.io/x/ref/services/device/internal/config"
 	"v.io/x/ref/services/device/internal/impl"
-	"v.io/x/ref/services/internal/acls"
+	"v.io/x/ref/services/internal/pathperms"
 	"v.io/x/ref/services/mounttable/mounttablelib"
 
 	"v.io/v23"
@@ -40,9 +40,9 @@
 )
 
 type NamespaceArgs struct {
-	Name           string         // Name to publish the mounttable service under.
-	ListenSpec     rpc.ListenSpec // ListenSpec for the server.
-	AccessListFile string         // Path to the AccessList file used by the mounttable.
+	Name            string         // Name to publish the mounttable service under.
+	ListenSpec      rpc.ListenSpec // ListenSpec for the server.
+	PermissionsFile string         // Path to the Permissions file used by the mounttable.
 	// Name in the local neighborhood on which to make the mounttable
 	// visible. If empty, the mounttable will not be visible in the local
 	// neighborhood.
@@ -90,8 +90,8 @@
 	}
 	// In test mode, we skip writing the info file to disk, and we skip
 	// attempting to start the claimable service: the device must have been
-	// claimed already to enable updates anyway, and checking for acls in
-	// NewClaimableDispatcher needlessly prints an acl signature
+	// claimed already to enable updates anyway, and checking for perms in
+	// NewClaimableDispatcher needlessly prints a perms signature
 	// verification error to the logs.
 	if args.Device.TestMode {
 		return startClaimedDevice(ctx, args)
@@ -222,9 +222,9 @@
 }
 
 func startClaimedDevice(ctx *context.T, args Args) (func(), error) {
-	permStore := acls.NewPathStore(v23.GetPrincipal(ctx))
-	acldir := impl.AclDir(args.Device.ConfigState)
-	debugAuth, err := acls.NewHierarchicalAuthorizer(acldir, acldir, permStore)
+	permStore := pathperms.NewPathStore(v23.GetPrincipal(ctx))
+	permsdir := impl.PermsDir(args.Device.ConfigState)
+	debugAuth, err := pathperms.NewHierarchicalAuthorizer(permsdir, permsdir, permStore)
 	if err != nil {
 		return nil, err
 	}
@@ -304,7 +304,7 @@
 }
 
 func startMounttable(ctx *context.T, n NamespaceArgs) (string, func(), error) {
-	mtName, stopMT, err := mounttablelib.StartServers(ctx, n.ListenSpec, n.Name, n.Neighborhood, n.AccessListFile, "mounttable")
+	mtName, stopMT, err := mounttablelib.StartServers(ctx, n.ListenSpec, n.Name, n.Neighborhood, n.PermissionsFile, "mounttable")
 	if err != nil {
 		vlog.Errorf("mounttablelib.StartServers(%#v) failed: %v", n, err)
 	} else {
@@ -329,7 +329,7 @@
 // Returns:
 // (1) Function to be called to force the service to shutdown
 // (2) Any errors in starting the service (in which case, (1) will be nil)
-func startDeviceServer(ctx *context.T, args DeviceArgs, mt string, permStore *acls.PathStore) (shutdown func(), err error) {
+func startDeviceServer(ctx *context.T, args DeviceArgs, mt string, permStore *pathperms.PathStore) (shutdown func(), err error) {
 	server, err := v23.NewServer(ctx)
 	if err != nil {
 		return nil, err
diff --git a/services/groups/groupsd/main.go b/services/groups/groupsd/main.go
index ab59f78..ad79ca6 100644
--- a/services/groups/groupsd/main.go
+++ b/services/groups/groupsd/main.go
@@ -40,8 +40,8 @@
 	}
 
 	// TODO(sadovsky): Switch to using NewAuthorizerOrDie.
-	acl := access.Permissions{}
-	m := server.NewManager(memstore.New(), acl)
+	perms := access.Permissions{}
+	m := server.NewManager(memstore.New(), perms)
 
 	// Publish the service in the mount table.
 	if err := s.ServeDispatcher(*name, m); err != nil {
diff --git a/services/groups/internal/server/group.go b/services/groups/internal/server/group.go
index cc0f090..50181b4 100644
--- a/services/groups/internal/server/group.go
+++ b/services/groups/internal/server/group.go
@@ -27,17 +27,17 @@
 // It seems we need either (a) identity providers to manage group servers and
 // reserve buckets for users they've blessed, or (b) some way to determine the
 // user name from a blessing and enforce that group names start with user names.
-func (g *group) Create(ctx *context.T, call rpc.ServerCall, acl access.Permissions, entries []groups.BlessingPatternChunk) error {
-	// Perform AccessList check.
-	// TODO(sadovsky): Enable this AccessList check and acquire a lock on the group
-	// server AccessList.
+func (g *group) Create(ctx *context.T, call rpc.ServerCall, perms access.Permissions, entries []groups.BlessingPatternChunk) error {
+	// Perform Permissions check.
+	// TODO(sadovsky): Enable this Permissions check and acquire a lock on the
+	// group server Permissions.
 	if false {
-		if err := g.authorize(ctx, call.Security(), g.m.acl); err != nil {
+		if err := g.authorize(ctx, call.Security(), g.m.perms); err != nil {
 			return err
 		}
 	}
-	if acl == nil {
-		acl = access.Permissions{}
+	if perms == nil {
+		perms = access.Permissions{}
 		blessings, _ := security.RemoteBlessingNames(ctx, call.Security())
 		if len(blessings) == 0 {
 			// The blessings presented by the caller do not give it a name for this
@@ -47,7 +47,7 @@
 		}
 		for _, tag := range access.AllTypicalTags() {
 			for _, b := range blessings {
-				acl.Add(security.BlessingPattern(b), string(tag))
+				perms.Add(security.BlessingPattern(b), string(tag))
 			}
 		}
 	}
@@ -55,7 +55,7 @@
 	for _, v := range entries {
 		entrySet[v] = struct{}{}
 	}
-	gd := groupData{AccessList: acl, Entries: entrySet}
+	gd := groupData{Perms: perms, Entries: entrySet}
 	if err := g.m.st.Insert(g.name, gd); err != nil {
 		// TODO(sadovsky): We are leaking the fact that this group exists. If the
 		// client doesn't have access to this group, we should probably return an
@@ -105,30 +105,30 @@
 	return groups.RestResponse{}, version, nil
 }
 
-func (g *group) SetPermissions(ctx *context.T, call rpc.ServerCall, acl access.Permissions, version string) error {
+func (g *group) SetPermissions(ctx *context.T, call rpc.ServerCall, perms access.Permissions, version string) error {
 	return g.update(ctx, call.Security(), version, func(gd *groupData) {
-		gd.AccessList = acl
+		gd.Perms = perms
 	})
 }
 
-func (g *group) GetPermissions(ctx *context.T, call rpc.ServerCall) (acl access.Permissions, version string, err error) {
+func (g *group) GetPermissions(ctx *context.T, call rpc.ServerCall) (perms access.Permissions, version string, err error) {
 	gd, version, err := g.getInternal(ctx, call.Security())
 	if err != nil {
 		return nil, "", err
 	}
-	return gd.AccessList, version, nil
+	return gd.Perms, version, nil
 }
 
 ////////////////////////////////////////
 // Internal helpers
 
 // Returns a VDL-compatible error.
-func (g *group) authorize(ctx *context.T, call security.Call, acl access.Permissions) error {
+func (g *group) authorize(ctx *context.T, call security.Call, perms access.Permissions) error {
 	// TODO(sadovsky): We ignore the returned error since TypicalTagType is
 	// guaranteed to return a valid tagType. It would be nice to have an
 	// alternative function that assumes TypicalTagType, since presumably that's
 	// the overwhelmingly common case.
-	auth, _ := access.PermissionsAuthorizer(acl, access.TypicalTagType())
+	auth, _ := access.PermissionsAuthorizer(perms, access.TypicalTagType())
 	if err := auth.Authorize(ctx, call); err != nil {
 		// TODO(sadovsky): Return NoAccess if appropriate.
 		return verror.New(verror.ErrNoExistOrNoAccess, ctx, err)
@@ -150,7 +150,7 @@
 	if !ok {
 		return groupData{}, "", verror.New(verror.ErrInternal, ctx, "bad value for key: "+g.name)
 	}
-	if err := g.authorize(ctx, call, gd.AccessList); err != nil {
+	if err := g.authorize(ctx, call, gd.Perms); err != nil {
 		return groupData{}, "", err
 	}
 	return gd, version, nil
diff --git a/services/groups/internal/server/manager.go b/services/groups/internal/server/manager.go
index af8e7d4..bc050ad 100644
--- a/services/groups/internal/server/manager.go
+++ b/services/groups/internal/server/manager.go
@@ -14,14 +14,14 @@
 )
 
 type manager struct {
-	st  Store
-	acl access.Permissions
+	st    Store
+	perms access.Permissions
 }
 
 var _ rpc.Dispatcher = (*manager)(nil)
 
-func NewManager(st Store, acl access.Permissions) *manager {
-	return &manager{st: st, acl: acl}
+func NewManager(st Store, perms access.Permissions) *manager {
+	return &manager{st: st, perms: perms}
 }
 
 func (m *manager) Lookup(suffix string) (interface{}, security.Authorizer, error) {
diff --git a/services/groups/internal/server/server_test.go b/services/groups/internal/server/server_test.go
index 0efc3b2..0d4d8f5 100644
--- a/services/groups/internal/server/server_test.go
+++ b/services/groups/internal/server/server_test.go
@@ -35,7 +35,7 @@
 	return res.Entries
 }
 
-func getAccessListOrDie(g groups.GroupClientStub, ctx *context.T, t *testing.T) access.Permissions {
+func getPermissionsOrDie(g groups.GroupClientStub, ctx *context.T, t *testing.T) access.Permissions {
 	res, _, err := g.GetPermissions(ctx)
 	if err != nil {
 		debug.PrintStack()
@@ -91,10 +91,10 @@
 		vlog.Fatal("s.Listen() failed: ", err)
 	}
 
-	// TODO(sadovsky): Pass in an AccessList and test AccessList-checking in
+	// TODO(sadovsky): Pass in a Permissions and test Permissions-checking in
 	// Group.Create().
-	acl := access.Permissions{}
-	m := server.NewManager(memstore.New(), acl)
+	perms := access.Permissions{}
+	m := server.NewManager(memstore.New(), perms)
 
 	if err := s.ServeDispatcher("", m); err != nil {
 		vlog.Fatal("s.ServeDispatcher() failed: ", err)
@@ -154,19 +154,19 @@
 	ctx, serverName, cleanup := setupOrDie()
 	defer cleanup()
 
-	// Create a group with a default AccessList and no entries.
+	// Create a group with a default Permissions and no entries.
 	g := groups.GroupClient(naming.JoinAddressName(serverName, "grpA"))
 	if err := g.Create(ctx, nil, nil); err != nil {
 		t.Fatal("Create failed: ", err)
 	}
-	// Verify AccessList of created group.
-	acl := access.Permissions{}
+	// Verify Permissions of created group.
+	perms := access.Permissions{}
 	for _, tag := range access.AllTypicalTags() {
-		acl.Add(security.BlessingPattern("server/client"), string(tag))
+		perms.Add(security.BlessingPattern("server/client"), string(tag))
 	}
-	wantAccessList, gotAccessList := acl, getAccessListOrDie(g, ctx, t)
-	if !reflect.DeepEqual(wantAccessList, gotAccessList) {
-		t.Errorf("AccessLists do not match: want %v, got %v", wantAccessList, gotAccessList)
+	wantPermissions, gotPermissions := perms, getPermissionsOrDie(g, ctx, t)
+	if !reflect.DeepEqual(wantPermissions, gotPermissions) {
+		t.Errorf("Permissions do not match: want %v, got %v", wantPermissions, gotPermissions)
 	}
 	// Verify entries of created group.
 	want, got := bpcSet(), getEntriesOrDie(g, ctx, t)
@@ -180,21 +180,21 @@
 		t.Fatal("Create should have failed")
 	}
 
-	// Create a group with an AccessList and a few entries, including some
+	// Create a group with a Permissions and a few entries, including some
 	// redundant ones.
 	g = groups.GroupClient(naming.JoinAddressName(serverName, "grpB"))
-	acl = access.Permissions{}
+	perms = access.Permissions{}
 	// Allow Admin and Read so that we can call GetPermissions and Get.
 	for _, tag := range []access.Tag{access.Admin, access.Read} {
-		acl.Add(security.BlessingPattern("server/client"), string(tag))
+		perms.Add(security.BlessingPattern("server/client"), string(tag))
 	}
-	if err := g.Create(ctx, acl, bpcSlice("foo", "bar", "foo")); err != nil {
+	if err := g.Create(ctx, perms, bpcSlice("foo", "bar", "foo")); err != nil {
 		t.Fatal("Create failed: ", err)
 	}
-	// Verify AccessList of created group.
-	wantAccessList, gotAccessList = acl, getAccessListOrDie(g, ctx, t)
-	if !reflect.DeepEqual(wantAccessList, gotAccessList) {
-		t.Errorf("AccessLists do not match: want %v, got %v", wantAccessList, gotAccessList)
+	// Verify Permissions of created group.
+	wantPermissions, gotPermissions = perms, getPermissionsOrDie(g, ctx, t)
+	if !reflect.DeepEqual(wantPermissions, gotPermissions) {
+		t.Errorf("Permissions do not match: want %v, got %v", wantPermissions, gotPermissions)
 	}
 	// Verify entries of created group.
 	want, got = bpcSet("foo", "bar"), getEntriesOrDie(g, ctx, t)
@@ -207,7 +207,7 @@
 	ctx, serverName, cleanup := setupOrDie()
 	defer cleanup()
 
-	// Create a group with a default AccessList and no entries, check that we can
+	// Create a group with a default Permissions and no entries, check that we can
 	// delete it.
 	g := groups.GroupClient(naming.JoinAddressName(serverName, "grpA"))
 	if err := g.Create(ctx, nil, nil); err != nil {
@@ -245,12 +245,12 @@
 		t.Fatal("Create failed: ", err)
 	}
 
-	// Create a group with an AccessList that disallows Delete(), check that
+	// Create a group with a Permissions that disallows Delete(), check that
 	// Delete() fails.
 	g = groups.GroupClient(naming.JoinAddressName(serverName, "grpC"))
-	acl := access.Permissions{}
-	acl.Add(security.BlessingPattern("server/client"), string(access.Admin))
-	if err := g.Create(ctx, acl, nil); err != nil {
+	perms := access.Permissions{}
+	perms.Add(security.BlessingPattern("server/client"), string(access.Admin))
+	if err := g.Create(ctx, perms, nil); err != nil {
 		t.Fatal("Create failed: ", err)
 	}
 	// Delete should fail (no access).
@@ -259,90 +259,90 @@
 	}
 }
 
-func TestAccessListMethods(t *testing.T) {
+func TestPermissionsMethods(t *testing.T) {
 	ctx, serverName, cleanup := setupOrDie()
 	defer cleanup()
 
-	// Create a group with a default AccessList and no entries.
+	// Create a group with a default Permissions and no entries.
 	g := groups.GroupClient(naming.JoinAddressName(serverName, "grpA"))
 	if err := g.Create(ctx, nil, nil); err != nil {
 		t.Fatal("Create failed: ", err)
 	}
 
-	myacl := access.Permissions{}
-	myacl.Add(security.BlessingPattern("server/client"), string(access.Admin))
-	// Demonstrate that myacl differs from the default AccessList.
-	if reflect.DeepEqual(myacl, getAccessListOrDie(g, ctx, t)) {
-		t.Fatal("AccessLists should not match: %v", myacl)
+	myperms := access.Permissions{}
+	myperms.Add(security.BlessingPattern("server/client"), string(access.Admin))
+	// Demonstrate that myperms differs from the default Permissions.
+	if reflect.DeepEqual(myperms, getPermissionsOrDie(g, ctx, t)) {
+		t.Fatal("Permissions should not match: %v", myperms)
 	}
 
-	var aclBefore, aclAfter access.Permissions
+	var permsBefore, permsAfter access.Permissions
 	var versionBefore, versionAfter string
 
-	getAccessListAndVersionOrDie := func() (access.Permissions, string) {
+	getPermissionsAndVersionOrDie := func() (access.Permissions, string) {
 		// Doesn't use getVersionOrDie since that requires access.Read permission.
-		acl, version, err := g.GetPermissions(ctx)
+		perms, version, err := g.GetPermissions(ctx)
 		if err != nil {
 			debug.PrintStack()
 			t.Fatal("GetPermissions failed: ", err)
 		}
-		return acl, version
+		return perms, version
 	}
 
 	// SetPermissions with bad version should fail.
-	aclBefore, versionBefore = getAccessListAndVersionOrDie()
-	if err := g.SetPermissions(ctx, myacl, "20"); verror.ErrorID(err) != verror.ErrBadVersion.ID {
+	permsBefore, versionBefore = getPermissionsAndVersionOrDie()
+	if err := g.SetPermissions(ctx, myperms, "20"); verror.ErrorID(err) != verror.ErrBadVersion.ID {
 		t.Fatal("SetPermissions should have failed with version error")
 	}
-	// Since SetPermissions failed, the AccessList and version should not have
+	// Since SetPermissions failed, the Permissions and version should not have
 	// changed.
-	aclAfter, versionAfter = getAccessListAndVersionOrDie()
-	if !reflect.DeepEqual(aclBefore, aclAfter) {
-		t.Errorf("AccessLists do not match: want %v, got %v", aclBefore, aclAfter)
+	permsAfter, versionAfter = getPermissionsAndVersionOrDie()
+	if !reflect.DeepEqual(permsBefore, permsAfter) {
+		t.Errorf("Permissions do not match: want %v, got %v", permsBefore, permsAfter)
 	}
 	if versionBefore != versionAfter {
 		t.Errorf("Versions do not match: want %v, got %v", versionBefore, versionAfter)
 	}
 
 	// SetPermissions with correct version should succeed.
-	aclBefore, versionBefore = aclAfter, versionAfter
-	if err := g.SetPermissions(ctx, myacl, versionBefore); err != nil {
+	permsBefore, versionBefore = permsAfter, versionAfter
+	if err := g.SetPermissions(ctx, myperms, versionBefore); err != nil {
 		t.Fatal("SetPermissions failed: ", err)
 	}
-	// Check that the AccessList and version actually changed.
-	aclAfter, versionAfter = getAccessListAndVersionOrDie()
-	if !reflect.DeepEqual(myacl, aclAfter) {
-		t.Errorf("AccessLists do not match: want %v, got %v", myacl, aclAfter)
+	// Check that the Permissions and version actually changed.
+	permsAfter, versionAfter = getPermissionsAndVersionOrDie()
+	if !reflect.DeepEqual(myperms, permsAfter) {
+		t.Errorf("Permissions do not match: want %v, got %v", myperms, permsAfter)
 	}
 	if versionBefore == versionAfter {
 		t.Errorf("Versions should not match: %v", versionBefore)
 	}
 
 	// SetPermissions with empty version should succeed.
-	aclBefore, versionBefore = aclAfter, versionAfter
-	myacl.Add(security.BlessingPattern("server/client"), string(access.Read))
-	if err := g.SetPermissions(ctx, myacl, ""); err != nil {
+	permsBefore, versionBefore = permsAfter, versionAfter
+	myperms.Add(security.BlessingPattern("server/client"), string(access.Read))
+	if err := g.SetPermissions(ctx, myperms, ""); err != nil {
 		t.Fatal("SetPermissions failed: ", err)
 	}
-	// Check that the AccessList and version actually changed.
-	aclAfter, versionAfter = getAccessListAndVersionOrDie()
-	if !reflect.DeepEqual(myacl, aclAfter) {
-		t.Errorf("AccessLists do not match: want %v, got %v", myacl, aclAfter)
+	// Check that the Permissions and version actually changed.
+	permsAfter, versionAfter = getPermissionsAndVersionOrDie()
+	if !reflect.DeepEqual(myperms, permsAfter) {
+		t.Errorf("Permissions do not match: want %v, got %v", myperms, permsAfter)
 	}
 	if versionBefore == versionAfter {
 		t.Errorf("Versions should not match: %v", versionBefore)
 	}
 
-	// SetPermissions with unchanged AccessList should succeed, and version should
+	// SetPermissions with unchanged Permissions should succeed, and version should
 	// still change.
-	aclBefore, versionBefore = aclAfter, versionAfter
-	if err := g.SetPermissions(ctx, myacl, ""); err != nil {
+	permsBefore, versionBefore = permsAfter, versionAfter
+	if err := g.SetPermissions(ctx, myperms, ""); err != nil {
 		t.Fatal("SetPermissions failed: ", err)
 	}
-	// Check that the AccessList did not change and the version did change.
-	aclAfter, versionAfter = getAccessListAndVersionOrDie()
-	if !reflect.DeepEqual(aclBefore, aclAfter) {
-		t.Errorf("AccessLists do not match: want %v, got %v", aclBefore, aclAfter)
+	// Check that the Permissions did not change and the version did change.
+	permsAfter, versionAfter = getPermissionsAndVersionOrDie()
+	if !reflect.DeepEqual(permsBefore, permsAfter) {
+		t.Errorf("Permissions do not match: want %v, got %v", permsBefore, permsAfter)
 	}
 	if versionBefore == versionAfter {
 		t.Errorf("Versions should not match: %v", versionBefore)
@@ -355,7 +355,7 @@
 	if _, _, err := g.GetPermissions(ctx); verror.ErrorID(err) != verror.ErrNoExistOrNoAccess.ID {
 		t.Fatal("GetPermissions should have failed with access error")
 	}
-	if err := g.SetPermissions(ctx, myacl, ""); verror.ErrorID(err) != verror.ErrNoExistOrNoAccess.ID {
+	if err := g.SetPermissions(ctx, myperms, ""); verror.ErrorID(err) != verror.ErrNoExistOrNoAccess.ID {
 		t.Fatal("SetPermissions should have failed with access error")
 	}
 }
@@ -365,7 +365,7 @@
 	ctx, serverName, cleanup := setupOrDie()
 	defer cleanup()
 
-	// Create a group with a default AccessList and no entries.
+	// Create a group with a default Permissions and no entries.
 	g := groups.GroupClient(naming.JoinAddressName(serverName, "grpA"))
 	if err := g.Create(ctx, nil, nil); err != nil {
 		t.Fatal("Create failed: ", err)
@@ -432,12 +432,12 @@
 		t.Errorf("Versions should not match: %v", versionBefore)
 	}
 
-	// Create a group with an AccessList that disallows Add(), check that Add()
+	// Create a group with a Permissions that disallows Add(), check that Add()
 	// fails.
 	g = groups.GroupClient(naming.JoinAddressName(serverName, "grpB"))
-	acl := access.Permissions{}
-	acl.Add(security.BlessingPattern("server/client"), string(access.Admin))
-	if err := g.Create(ctx, acl, nil); err != nil {
+	perms := access.Permissions{}
+	perms.Add(security.BlessingPattern("server/client"), string(access.Admin))
+	if err := g.Create(ctx, perms, nil); err != nil {
 		t.Fatal("Create failed: ", err)
 	}
 	// Add should fail (no access).
@@ -451,7 +451,7 @@
 	ctx, serverName, cleanup := setupOrDie()
 	defer cleanup()
 
-	// Create a group with a default AccessList and two entries.
+	// Create a group with a default Permissions and two entries.
 	g := groups.GroupClient(naming.JoinAddressName(serverName, "grpA"))
 	if err := g.Create(ctx, nil, bpcSlice("foo", "bar")); err != nil {
 		t.Fatal("Create failed: ", err)
@@ -517,12 +517,12 @@
 		t.Errorf("Versions should not match: %v", versionBefore)
 	}
 
-	// Create a group with an AccessList that disallows Remove(), check that
+	// Create a group with a Permissions that disallows Remove(), check that
 	// Remove() fails.
 	g = groups.GroupClient(naming.JoinAddressName(serverName, "grpB"))
-	acl := access.Permissions{}
-	acl.Add(security.BlessingPattern("server/client"), string(access.Admin))
-	if err := g.Create(ctx, acl, bpcSlice("foo", "bar")); err != nil {
+	perms := access.Permissions{}
+	perms.Add(security.BlessingPattern("server/client"), string(access.Admin))
+	if err := g.Create(ctx, perms, bpcSlice("foo", "bar")); err != nil {
 		t.Fatal("Create failed: ", err)
 	}
 	// Remove should fail (no access).
diff --git a/services/groups/internal/server/types.vdl b/services/groups/internal/server/types.vdl
index d569880..5631696 100644
--- a/services/groups/internal/server/types.vdl
+++ b/services/groups/internal/server/types.vdl
@@ -12,6 +12,6 @@
 // groupData represents the persistent state of a group. (The group name is
 // persisted as the store entry key.)
 type groupData struct {
-	AccessList     access.Permissions
+	Perms   access.Permissions
 	Entries set[groups.BlessingPatternChunk]
 }
diff --git a/services/groups/internal/server/types.vdl.go b/services/groups/internal/server/types.vdl.go
index 0a2eb83..7b14760 100644
--- a/services/groups/internal/server/types.vdl.go
+++ b/services/groups/internal/server/types.vdl.go
@@ -19,8 +19,8 @@
 // groupData represents the persistent state of a group. (The group name is
 // persisted as the store entry key.)
 type groupData struct {
-	AccessList access.Permissions
-	Entries    map[groups.BlessingPatternChunk]struct{}
+	Perms   access.Permissions
+	Entries map[groups.BlessingPatternChunk]struct{}
 }
 
 func (groupData) __VDLReflect(struct {
diff --git a/services/internal/binarylib/dispatcher.go b/services/internal/binarylib/dispatcher.go
index 9b0b4d9..3a138c7 100644
--- a/services/internal/binarylib/dispatcher.go
+++ b/services/internal/binarylib/dispatcher.go
@@ -10,8 +10,7 @@
 	"v.io/v23/rpc"
 	"v.io/v23/security"
 	"v.io/v23/services/repository"
-
-	"v.io/x/ref/services/internal/acls"
+	"v.io/x/ref/services/internal/pathperms"
 )
 
 const (
@@ -21,21 +20,21 @@
 
 // dispatcher holds the state of the binary repository dispatcher.
 type dispatcher struct {
-	state    *state
-	aclstore *acls.PathStore
+	state      *state
+	permsStore *pathperms.PathStore
 }
 
 // NewDispatcher is the dispatcher factory.
 func NewDispatcher(principal security.Principal, state *state) (rpc.Dispatcher, error) {
 	return &dispatcher{
-		state:    state,
-		aclstore: acls.NewPathStore(principal),
+		state:      state,
+		permsStore: pathperms.NewPathStore(principal),
 	}, nil
 }
 
 // DISPATCHER INTERFACE IMPLEMENTATION
 
-func aclPath(rootDir, suffix string) string {
+func permsPath(rootDir, suffix string) string {
 	var dir string
 	if suffix == "" {
 		// Directory is in namespace overlapped with Vanadium namespace
@@ -47,17 +46,17 @@
 	return dir
 }
 
-func newAuthorizer(rootDir, suffix string, aclstore *acls.PathStore) (security.Authorizer, error) {
-	return acls.NewHierarchicalAuthorizer(
-		aclPath(rootDir, ""),
-		aclPath(rootDir, suffix),
-		aclstore)
+func newAuthorizer(rootDir, suffix string, permsStore *pathperms.PathStore) (security.Authorizer, error) {
+	return pathperms.NewHierarchicalAuthorizer(
+		permsPath(rootDir, ""),
+		permsPath(rootDir, suffix),
+		permsStore)
 }
 
 func (d *dispatcher) Lookup(suffix string) (interface{}, security.Authorizer, error) {
-	auth, err := newAuthorizer(d.state.rootDir, suffix, d.aclstore)
+	auth, err := newAuthorizer(d.state.rootDir, suffix, d.permsStore)
 	if err != nil {
 		return nil, nil, err
 	}
-	return repository.BinaryServer(newBinaryService(d.state, suffix, d.aclstore)), auth, nil
+	return repository.BinaryServer(newBinaryService(d.state, suffix, d.permsStore)), auth, nil
 }
diff --git a/services/internal/binarylib/acl_test.go b/services/internal/binarylib/perms_test.go
similarity index 87%
rename from services/internal/binarylib/acl_test.go
rename to services/internal/binarylib/perms_test.go
index c338de1..59de734 100644
--- a/services/internal/binarylib/acl_test.go
+++ b/services/internal/binarylib/perms_test.go
@@ -126,7 +126,7 @@
 	}
 
 	vlog.VI(2).Infof("Validate that the AccessList also allows Self")
-	acl, _, err := b("bini/private").GetPermissions(selfCtx)
+	perms, _, err := b("bini/private").GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions failed: %v", err)
 	}
@@ -137,7 +137,7 @@
 		"Debug":   access.AccessList{In: []security.BlessingPattern{"self/$", "self/child"}},
 		"Resolve": access.AccessList{In: []security.BlessingPattern{"self/$", "self/child"}},
 	}
-	if got, want := acl.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
+	if got, want := perms.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
 		t.Errorf("got %#v, expected %#v ", got, want)
 	}
 }
@@ -199,7 +199,7 @@
 	}
 
 	vlog.VI(2).Infof("Validate the AccessList file on bini/private.")
-	acl, _, err := b("bini/private").GetPermissions(selfCtx)
+	perms, _, err := b("bini/private").GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions failed: %v", err)
 	}
@@ -210,16 +210,16 @@
 		"Debug":   access.AccessList{In: []security.BlessingPattern{"self"}},
 		"Resolve": access.AccessList{In: []security.BlessingPattern{"self"}},
 	}
-	if got, want := acl.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
+	if got, want := perms.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
 		t.Errorf("got %#v, expected %#v ", got, want)
 	}
 
 	vlog.VI(2).Infof("Validate the AccessList file on bini/private.")
-	acl, version, err := b("bini/private").GetPermissions(selfCtx)
+	perms, version, err := b("bini/private").GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions failed: %v", err)
 	}
-	if got, want := acl.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
+	if got, want := perms.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
 		t.Errorf("got %#v, expected %#v ", got, want)
 	}
 
@@ -235,14 +235,14 @@
 
 	vlog.VI(2).Infof("Self modifies the AccessList file on bini/private.")
 	for _, tag := range access.AllTypicalTags() {
-		acl.Clear("self", string(tag))
-		acl.Add("self/$", string(tag))
+		perms.Clear("self", string(tag))
+		perms.Add("self/$", string(tag))
 	}
-	if err := b("bini/private").SetPermissions(selfCtx, acl, version); err != nil {
+	if err := b("bini/private").SetPermissions(selfCtx, perms, version); err != nil {
 		t.Fatalf("SetPermissions failed: %v", err)
 	}
 
-	vlog.VI(2).Infof(" Verify that bini/private's acls are updated.")
+	vlog.VI(2).Infof(" Verify that bini/private's perms are updated.")
 	updated := access.Permissions{
 		"Admin":   access.AccessList{In: []security.BlessingPattern{"self/$"}},
 		"Read":    access.AccessList{In: []security.BlessingPattern{"self/$"}},
@@ -250,11 +250,11 @@
 		"Debug":   access.AccessList{In: []security.BlessingPattern{"self/$"}},
 		"Resolve": access.AccessList{In: []security.BlessingPattern{"self/$"}},
 	}
-	acl, _, err = b("bini/private").GetPermissions(selfCtx)
+	perms, _, err = b("bini/private").GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions failed: %v", err)
 	}
-	if got, want := acl.Normalize(), updated.Normalize(); !reflect.DeepEqual(got, want) {
+	if got, want := perms.Normalize(), updated.Normalize(); !reflect.DeepEqual(got, want) {
 		t.Errorf("got %#v, expected %#v ", got, want)
 	}
 
@@ -284,7 +284,7 @@
 	}
 
 	vlog.VI(2).Infof("Other still can't create so Self gives Other right to Create.")
-	acl, tag, err := b("bini").GetPermissions(selfCtx)
+	perms, tag, err := b("bini").GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions() failed: %v", err)
 	}
@@ -293,17 +293,17 @@
 	// this test: that self/other acquires the right to invoke Create at the
 	// root. In particular:
 	//
-	// a. acl.Add("self", "Write ")
-	// b. acl.Add("self/other", "Write")
-	// c. acl.Add("self/other/$", "Write")
+	// a. perms.Add("self", "Write ")
+	// b. perms.Add("self/other", "Write")
+	// c. perms.Add("self/other/$", "Write")
 	//
 	// will all give self/other the right to invoke Create but in the case of
 	// (a) it will also extend this right to self's delegates (because of the
 	// absence of the $) including other and in (b) will also extend the
 	// Create right to all of other's delegates. Since (c) is the minimum
 	// case, use that.
-	acl.Add("self/other/$", string("Write"))
-	err = b("bini").SetPermissions(selfCtx, acl, tag)
+	perms.Add("self/other/$", string("Write"))
+	err = b("bini").SetPermissions(selfCtx, perms, tag)
 	if err != nil {
 		t.Fatalf("SetPermissions() failed: %v", err)
 	}
@@ -317,7 +317,7 @@
 		t.FailNow()
 	}
 
-	vlog.VI(2).Infof("Other can read acls for bini/otherbinary.")
+	vlog.VI(2).Infof("Other can read perms for bini/otherbinary.")
 	updated = access.Permissions{
 		"Admin":   access.AccessList{In: []security.BlessingPattern{"self/$", "self/other"}},
 		"Read":    access.AccessList{In: []security.BlessingPattern{"self/$", "self/other"}},
@@ -325,21 +325,21 @@
 		"Debug":   access.AccessList{In: []security.BlessingPattern{"self/$", "self/other"}},
 		"Resolve": access.AccessList{In: []security.BlessingPattern{"self/$", "self/other"}},
 	}
-	acl, _, err = b("bini/otherbinary").GetPermissions(otherCtx)
+	perms, _, err = b("bini/otherbinary").GetPermissions(otherCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions failed: %v", err)
 	}
-	if got, want := acl.Normalize(), updated.Normalize(); !reflect.DeepEqual(want, got) {
+	if got, want := perms.Normalize(), updated.Normalize(); !reflect.DeepEqual(want, got) {
 		t.Errorf("got %#v, expected %#v ", got, want)
 	}
 
 	vlog.VI(2).Infof("Other tries to exclude self by removing self from the AccessList set")
-	acl, tag, err = b("bini/otherbinary").GetPermissions(otherCtx)
+	perms, tag, err = b("bini/otherbinary").GetPermissions(otherCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions() failed: %v", err)
 	}
-	acl.Clear("self/$")
-	err = b("bini/otherbinary").SetPermissions(otherCtx, acl, tag)
+	perms.Clear("self/$")
+	err = b("bini/otherbinary").SetPermissions(otherCtx, perms, tag)
 	if err != nil {
 		t.Fatalf("SetPermissions() failed: %v", err)
 	}
@@ -352,11 +352,11 @@
 		"Debug":   access.AccessList{In: []security.BlessingPattern{"self/other"}},
 		"Resolve": access.AccessList{In: []security.BlessingPattern{"self/other"}},
 	}
-	acl, _, err = b("bini/otherbinary").GetPermissions(otherCtx)
+	perms, _, err = b("bini/otherbinary").GetPermissions(otherCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions failed: %v", err)
 	}
-	if got, want := acl.Normalize(), updated.Normalize(); !reflect.DeepEqual(want, got) {
+	if got, want := perms.Normalize(), updated.Normalize(); !reflect.DeepEqual(want, got) {
 		t.Errorf("got %#v, expected %#v ", got, want)
 	}
 
@@ -366,14 +366,14 @@
 	}
 
 	vlog.VI(2).Infof("Self petulantly blacklists other back.")
-	acl, tag, err = b("bini").GetPermissions(selfCtx)
+	perms, tag, err = b("bini").GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions() failed: %v", err)
 	}
 	for _, tag := range access.AllTypicalTags() {
-		acl.Blacklist("self/other", string(tag))
+		perms.Blacklist("self/other", string(tag))
 	}
-	err = b("bini").SetPermissions(selfCtx, acl, tag)
+	err = b("bini").SetPermissions(selfCtx, perms, tag)
 	if err != nil {
 		t.Fatalf("SetPermissions() failed: %v", err)
 	}
@@ -389,14 +389,14 @@
 	}
 
 	vlog.VI(2).Infof("Self petulantly blacklists other's binary too.")
-	acl, tag, err = b("bini/shared").GetPermissions(selfCtx)
+	perms, tag, err = b("bini/shared").GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions() failed: %v", err)
 	}
 	for _, tag := range access.AllTypicalTags() {
-		acl.Blacklist("self/other", string(tag))
+		perms.Blacklist("self/other", string(tag))
 	}
-	err = b("bini/shared").SetPermissions(selfCtx, acl, tag)
+	err = b("bini/shared").SetPermissions(selfCtx, perms, tag)
 	if err != nil {
 		t.Fatalf("SetPermissions() failed: %v", err)
 	}
@@ -410,12 +410,12 @@
 	vlog.VI(2).Infof("Self feels guilty for petulance and disempowers itself")
 	// TODO(rjkroege,caprita): This is a one-way transition for self. Perhaps it
 	// should not be. Consider adding a factory-reset facility.
-	acl, tag, err = b("bini").GetPermissions(selfCtx)
+	perms, tag, err = b("bini").GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions() failed: %v", err)
 	}
-	acl.Clear("self/$", "Admin")
-	err = b("bini").SetPermissions(selfCtx, acl, tag)
+	perms.Clear("self/$", "Admin")
+	err = b("bini").SetPermissions(selfCtx, perms, tag)
 	if err != nil {
 		t.Fatalf("SetPermissions() failed: %v", err)
 	}
@@ -453,7 +453,7 @@
 	pid := servicetest.ReadPID(t, nmh)
 	defer syscall.Kill(pid, syscall.SIGINT)
 
-	acl, tag, err := b("bini").GetPermissions(selfCtx)
+	perms, tag, err := b("bini").GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions failed: %#v", err)
 	}
@@ -464,17 +464,17 @@
 		"Debug":   access.AccessList{In: []security.BlessingPattern{"self/$", "self/child"}, NotIn: []string{}},
 		"Resolve": access.AccessList{In: []security.BlessingPattern{"self/$", "self/child"}, NotIn: []string{}},
 	}
-	if got, want := acl.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
+	if got, want := perms.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
 		t.Errorf("got %#v, expected %#v ", got, want)
 	}
 
-	acl.Blacklist("self", string("Read"))
-	err = b("bini").SetPermissions(selfCtx, acl, tag)
+	perms.Blacklist("self", string("Read"))
+	err = b("bini").SetPermissions(selfCtx, perms, tag)
 	if err != nil {
 		t.Fatalf("SetPermissions() failed: %v", err)
 	}
 
-	acl, tag, err = b("bini").GetPermissions(selfCtx)
+	perms, tag, err = b("bini").GetPermissions(selfCtx)
 	if err != nil {
 		t.Fatalf("GetPermissions failed: %#v", err)
 	}
@@ -485,7 +485,7 @@
 		"Debug":   access.AccessList{In: []security.BlessingPattern{"self/$", "self/child"}, NotIn: []string{}},
 		"Resolve": access.AccessList{In: []security.BlessingPattern{"self/$", "self/child"}, NotIn: []string{}},
 	}
-	if got, want := acl.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
+	if got, want := perms.Normalize(), expected.Normalize(); !reflect.DeepEqual(got, want) {
 		t.Errorf("got %#v, expected %#v ", got, want)
 	}
 
diff --git a/services/internal/binarylib/service.go b/services/internal/binarylib/service.go
index 85a0a03..dd8ad2c 100644
--- a/services/internal/binarylib/service.go
+++ b/services/internal/binarylib/service.go
@@ -3,15 +3,15 @@
 // license that can be found in the LICENSE file.
 
 // The implementation of the binary repository interface stores objects
-// identified by object name suffixes using the local file system. Given
-// an object name suffix, the implementation computes an MD5 hash of the
-// suffix and generates the following path in the local filesystem:
-// /<root-dir>/<dir_1>/.../<dir_n>/<hash>. The root directory and the
-// directory depth are parameters of the implementation. <root-dir> also
-// contains __acls/data and __acls/sig files storing the AccessLists for the
-// root level. The contents of the directory include the checksum and
-// data for each of the individual parts of the binary, the name of the
-// object and a directory containing the acls for this particular object:
+// identified by object name suffixes using the local file system. Given an
+// object name suffix, the implementation computes an MD5 hash of the suffix and
+// generates the following path in the local filesystem:
+// /<root-dir>/<dir_1>/.../<dir_n>/<hash>. The root directory and the directory
+// depth are parameters of the implementation. <root-dir> also contains
+// __acls/data and __acls/sig files storing the Permissions for the root level.
+// The contents of the directory include the checksum and data for each of the
+// individual parts of the binary, the name of the object and a directory
+// containing the perms for this particular object:
 //
 // name
 // acls/data
@@ -48,7 +48,7 @@
 	"v.io/v23/services/repository"
 	"v.io/v23/verror"
 	"v.io/x/lib/vlog"
-	"v.io/x/ref/services/internal/acls"
+	"v.io/x/ref/services/internal/pathperms"
 )
 
 // binaryService implements the Binary server interface.
@@ -60,8 +60,8 @@
 	// invocations.
 	state *state
 	// suffix is the name of the binary object.
-	suffix   string
-	aclstore *acls.PathStore
+	suffix     string
+	permsStore *pathperms.PathStore
 }
 
 const pkgPath = "v.io/x/ref/services/internal/binarylib"
@@ -82,12 +82,12 @@
 }
 
 // newBinaryService returns a new Binary service implementation.
-func newBinaryService(state *state, suffix string, aclstore *acls.PathStore) *binaryService {
+func newBinaryService(state *state, suffix string, permsStore *pathperms.PathStore) *binaryService {
 	return &binaryService{
-		path:     state.dir(suffix),
-		state:    state,
-		suffix:   suffix,
-		aclstore: aclstore,
+		path:       state.dir(suffix),
+		state:      state,
+		suffix:     suffix,
+		permsStore: permsStore,
 	}
 }
 
@@ -120,8 +120,8 @@
 		// None of the client's blessings are valid.
 		return verror.New(ErrNotAuthorized, ctx)
 	}
-	if err := i.aclstore.Set(aclPath(i.state.rootDir, i.suffix), acls.PermissionsForBlessings(rb), ""); err != nil {
-		vlog.Errorf("insertAccessLists(%v) failed: %v", rb, err)
+	if err := i.permsStore.Set(permsPath(i.state.rootDir, i.suffix), pathperms.PermissionsForBlessings(rb), ""); err != nil {
+		vlog.Errorf("insertPermissions(%v) failed: %v", rb, err)
 		return verror.New(ErrOperationFailed, ctx)
 	}
 
@@ -371,15 +371,16 @@
 	return ch, nil
 }
 
-func (i *binaryService) GetPermissions(ctx *context.T, call rpc.ServerCall) (acl access.Permissions, version string, err error) {
-	acl, version, err = i.aclstore.Get(aclPath(i.state.rootDir, i.suffix))
+func (i *binaryService) GetPermissions(ctx *context.T, call rpc.ServerCall) (perms access.Permissions, version string, err error) {
+	perms, version, err = i.permsStore.Get(permsPath(i.state.rootDir, i.suffix))
 	if os.IsNotExist(err) {
-		// No AccessList file found which implies a nil authorizer. This results in default authorization.
-		return acls.NilAuthPermissions(ctx, call.Security()), "", nil
+		// No Permissions file found which implies a nil authorizer. This results in
+		// default authorization.
+		return pathperms.NilAuthPermissions(ctx, call.Security()), "", nil
 	}
-	return acl, version, err
+	return perms, version, err
 }
 
-func (i *binaryService) SetPermissions(_ *context.T, _ rpc.ServerCall, acl access.Permissions, version string) error {
-	return i.aclstore.Set(aclPath(i.state.rootDir, i.suffix), acl, version)
+func (i *binaryService) SetPermissions(_ *context.T, _ rpc.ServerCall, perms access.Permissions, version string) error {
+	return i.permsStore.Set(permsPath(i.state.rootDir, i.suffix), perms, version)
 }
diff --git a/services/internal/acls/hierarchical_authorizer.go b/services/internal/pathperms/hierarchical_authorizer.go
similarity index 74%
rename from services/internal/acls/hierarchical_authorizer.go
rename to services/internal/pathperms/hierarchical_authorizer.go
index ddc79d4..1556eb0 100644
--- a/services/internal/acls/hierarchical_authorizer.go
+++ b/services/internal/pathperms/hierarchical_authorizer.go
@@ -2,7 +2,7 @@
 // Use of this source code is governed by a BSD-style
 // license that can be found in the LICENSE file.
 
-package acls
+package pathperms
 
 import (
 	"v.io/v23/context"
@@ -15,24 +15,24 @@
 // hierarchical authorization in the Authorize method.
 type hierarchicalAuthorizer struct {
 	rootDir, childDir string
-	get               TAMGetter
+	get               PermsGetter
 }
 
-// TAMGetter defines an abstract interface that a customer of
+// PermsGetter defines an abstract interface that a customer of
 // NewHierarchicalAuthorizer can use to obtain the PermissionsAuthorizer
 // instances that it needs to construct a hierarchicalAuthorizer.
-type TAMGetter interface {
-	// TAMForPath has two successful outcomes: either returning a valid
+type PermsGetter interface {
+	// PermsForPath has two successful outcomes: either returning a valid
 	// Permissions object or a boolean status true indicating that the
 	// Permissions object is intentionally not present. Finally, it returns an
 	// error if anything has gone wrong.
-	TAMForPath(path string) (access.Permissions, bool, error)
+	PermsForPath(path string) (access.Permissions, bool, error)
 }
 
-func mkRootAuth(rootTam access.Permissions) (security.Authorizer, error) {
-	rootAuth, err := access.PermissionsAuthorizer(rootTam, access.TypicalTagType())
+func mkRootAuth(rootPerms access.Permissions) (security.Authorizer, error) {
+	rootAuth, err := access.PermissionsAuthorizer(rootPerms, access.TypicalTagType())
 	if err != nil {
-		vlog.Errorf("Successfully obtained an AccessList from the filesystem but PermissionsAuthorizer couldn't use it: %v", err)
+		vlog.Errorf("Successfully obtained Permissions from the filesystem but PermissionsAuthorizer couldn't use it: %v", err)
 		return nil, err
 	}
 	return rootAuth, nil
@@ -41,7 +41,7 @@
 // NewHierarchicalAuthorizer creates a new hierarchicalAuthorizer: one
 // that implements a "root" like concept: admin rights at the root of
 // a server can invoke RPCs regardless of permissions set on child objects.
-func NewHierarchicalAuthorizer(rootDir, childDir string, get TAMGetter) (security.Authorizer, error) {
+func NewHierarchicalAuthorizer(rootDir, childDir string, get PermsGetter) (security.Authorizer, error) {
 	return &hierarchicalAuthorizer{
 		rootDir:  rootDir,
 		childDir: childDir,
@@ -50,11 +50,11 @@
 }
 
 func (ha *hierarchicalAuthorizer) Authorize(ctx *context.T, call security.Call) error {
-	rootPerms, intentionallyEmpty, err := ha.get.TAMForPath(ha.rootDir)
+	rootPerms, intentionallyEmpty, err := ha.get.PermsForPath(ha.rootDir)
 	if err != nil {
 		return err
 	} else if intentionallyEmpty {
-		vlog.VI(2).Infof("TAMForPath(%s) is intentionally empty", ha.rootDir)
+		vlog.VI(2).Infof("PermsForPath(%s) is intentionally empty", ha.rootDir)
 		return security.DefaultAuthorizer().Authorize(ctx, call)
 	}
 
@@ -69,7 +69,7 @@
 
 	// This is not fatal: the childDir may not exist if we are invoking
 	// a Create() method so we only use the root Permissions.
-	childPerms, intentionallyEmpty, err := ha.get.TAMForPath(ha.childDir)
+	childPerms, intentionallyEmpty, err := ha.get.PermsForPath(ha.childDir)
 	if err != nil {
 		return err
 	} else if intentionallyEmpty {
diff --git a/services/internal/acls/aclaccess.go b/services/internal/pathperms/permsaccess.go
similarity index 63%
rename from services/internal/acls/aclaccess.go
rename to services/internal/pathperms/permsaccess.go
index 9eabd47..a343fb0 100644
--- a/services/internal/acls/aclaccess.go
+++ b/services/internal/pathperms/permsaccess.go
@@ -2,11 +2,11 @@
 // Use of this source code is governed by a BSD-style
 // license that can be found in the LICENSE file.
 
-// Package acls provides a library to assist servers implementing
+// Package pathperms provides a library to assist servers implementing
 // GetPermissions/SetPermissions functions and authorizers where there are
-// path-specific AccessLists stored individually in files.
+// path-specific Permissions stored individually in files.
 // TODO(rjkroege): Add unit tests.
-package acls
+package pathperms
 
 import (
 	"io/ioutil"
@@ -23,18 +23,18 @@
 )
 
 const (
-	pkgPath = "v.io/x/ref/services/internal/acls"
-	sigName = "signature"
-	aclName = "data"
+	pkgPath   = "v.io/x/ref/services/internal/pathperms"
+	sigName   = "signature"
+	permsName = "data"
 )
 
 var (
 	ErrOperationFailed = verror.Register(pkgPath+".OperationFailed", verror.NoRetry, "{1:}{2:} operation failed{:_}")
 )
 
-// PathStore manages storage of a set of AccessLists in the filesystem where each
-// path identifies a specific AccessList in the set. PathStore synchronizes
-// access to its member AccessLists.
+// PathStore manages storage of a set of Permissions in the filesystem where each
+// path identifies a specific Permissions in the set. PathStore synchronizes
+// access to its member Permissions.
 type PathStore struct {
 	// TODO(rjkroege): Garbage collect the locks map.
 	pthlks    map[string]*sync.Mutex
@@ -43,17 +43,17 @@
 }
 
 // NewPathStore creates a new instance of the lock map that uses
-// principal to sign stored AccessList files.
+// principal to sign stored Permissions files.
 func NewPathStore(principal security.Principal) *PathStore {
 	return &PathStore{pthlks: make(map[string]*sync.Mutex), principal: principal}
 }
 
 // Get returns the Permissions from the data file in dir.
 func (store PathStore) Get(dir string) (access.Permissions, string, error) {
-	aclpath := filepath.Join(dir, aclName)
+	permspath := filepath.Join(dir, permsName)
 	sigpath := filepath.Join(dir, sigName)
 	defer store.lockPath(dir)()
-	return getCore(store.principal, aclpath, sigpath)
+	return getCore(store.principal, permspath, sigpath)
 }
 
 // TODO(rjkroege): Improve lock handling.
@@ -69,66 +69,66 @@
 	return lck.Unlock
 }
 
-func getCore(principal security.Principal, aclpath, sigpath string) (access.Permissions, string, error) {
-	f, err := os.Open(aclpath)
+func getCore(principal security.Principal, permspath, sigpath string) (access.Permissions, string, error) {
+	f, err := os.Open(permspath)
 	if err != nil {
 		// This path is rarely a fatal error so log informationally only.
-		vlog.VI(2).Infof("os.Open(%s) failed: %v", aclpath, err)
+		vlog.VI(2).Infof("os.Open(%s) failed: %v", permspath, err)
 		return nil, "", err
 	}
 	defer f.Close()
 
 	s, err := os.Open(sigpath)
 	if err != nil {
-		vlog.Errorf("Signatures for AccessLists are required: %s unavailable: %v", aclpath, err)
+		vlog.Errorf("Signatures for Permissions are required: %s unavailable: %v", permspath, err)
 		return nil, "", verror.New(ErrOperationFailed, nil)
 	}
 	defer s.Close()
 
-	// read and verify the signature of the acl file
+	// read and verify the signature of the perms file
 	vf, err := serialization.NewVerifyingReader(f, s, principal.PublicKey())
 	if err != nil {
-		vlog.Errorf("NewVerifyingReader() failed: %v (acl=%s, sig=%s)", err, aclpath, sigpath)
+		vlog.Errorf("NewVerifyingReader() failed: %v (perms=%s, sig=%s)", err, permspath, sigpath)
 		return nil, "", verror.New(ErrOperationFailed, nil)
 	}
 
-	acl, err := access.ReadPermissions(vf)
+	perms, err := access.ReadPermissions(vf)
 	if err != nil {
-		vlog.Errorf("ReadPermissions(%s) failed: %v", aclpath, err)
+		vlog.Errorf("ReadPermissions(%s) failed: %v", permspath, err)
 		return nil, "", err
 	}
-	version, err := ComputeVersion(acl)
+	version, err := ComputeVersion(perms)
 	if err != nil {
-		vlog.Errorf("acls.ComputeVersion failed: %v", err)
+		vlog.Errorf("pathperms.ComputeVersion failed: %v", err)
 		return nil, "", err
 	}
-	return acl, version, nil
+	return perms, version, nil
 }
 
 // Set writes the specified Permissions to the provided directory with
 // enforcement of version synchronization mechanism and locking.
-func (store PathStore) Set(dir string, acl access.Permissions, version string) error {
-	aclpath := filepath.Join(dir, aclName)
+func (store PathStore) Set(dir string, perms access.Permissions, version string) error {
+	permspath := filepath.Join(dir, permsName)
 	sigpath := filepath.Join(dir, sigName)
 	defer store.lockPath(dir)()
-	_, oversion, err := getCore(store.principal, aclpath, sigpath)
+	_, oversion, err := getCore(store.principal, permspath, sigpath)
 	if err != nil && !os.IsNotExist(err) {
 		return verror.New(ErrOperationFailed, nil)
 	}
 	if len(version) > 0 && version != oversion {
 		return verror.NewErrBadVersion(nil)
 	}
-	return write(store.principal, aclpath, sigpath, dir, acl)
+	return write(store.principal, permspath, sigpath, dir, perms)
 }
 
-// write writes the specified Permissions to the aclFile with a
+// write writes the specified Permissions to the permsFile with a
 // signature in sigFile.
-func write(principal security.Principal, aclFile, sigFile, dir string, acl access.Permissions) error {
+func write(principal security.Principal, permsFile, sigFile, dir string, perms access.Permissions) error {
 	// Create dir directory if it does not exist
 	os.MkdirAll(dir, os.FileMode(0700))
 	// Save the object to temporary data and signature files, and then move
 	// those files to the actual data and signature file.
-	data, err := ioutil.TempFile(dir, aclName)
+	data, err := ioutil.TempFile(dir, permsName)
 	if err != nil {
 		vlog.Errorf("Failed to open tmpfile data:%v", err)
 		return verror.New(ErrOperationFailed, nil)
@@ -145,15 +145,15 @@
 		vlog.Errorf("Failed to create NewSigningWriteCloser:%v", err)
 		return verror.New(ErrOperationFailed, nil)
 	}
-	if err = acl.WriteTo(writer); err != nil {
-		vlog.Errorf("Failed to SaveAccessList:%v", err)
+	if err = perms.WriteTo(writer); err != nil {
+		vlog.Errorf("Failed to SavePermissions:%v", err)
 		return verror.New(ErrOperationFailed, nil)
 	}
 	if err = writer.Close(); err != nil {
 		vlog.Errorf("Failed to Close() SigningWriteCloser:%v", err)
 		return verror.New(ErrOperationFailed, nil)
 	}
-	if err := os.Rename(data.Name(), aclFile); err != nil {
+	if err := os.Rename(data.Name(), permsFile); err != nil {
 		vlog.Errorf("os.Rename() failed:%v", err)
 		return verror.New(ErrOperationFailed, nil)
 	}
@@ -164,18 +164,18 @@
 	return nil
 }
 
-func (store PathStore) TAMForPath(path string) (access.Permissions, bool, error) {
-	tam, _, err := store.Get(path)
+func (store PathStore) PermsForPath(path string) (access.Permissions, bool, error) {
+	perms, _, err := store.Get(path)
 	if os.IsNotExist(err) {
 		return nil, true, nil
 	} else if err != nil {
 		return nil, false, err
 	}
-	return tam, false, nil
+	return perms, false, nil
 }
 
-// PrefixPatterns creates a pattern containing all of the prefix patterns of
-// the provided blessings.
+// PrefixPatterns creates a pattern containing all of the prefix patterns of the
+// provided blessings.
 func PrefixPatterns(blessings []string) []security.BlessingPattern {
 	var patterns []security.BlessingPattern
 	for _, b := range blessings {
@@ -184,31 +184,31 @@
 	return patterns
 }
 
-// PermissionsForBlessings creates the  Permissions list  that should be used
-// with a newly created object.
+// PermissionsForBlessings creates the Permissions list that should be used with
+// a newly created object.
 func PermissionsForBlessings(blessings []string) access.Permissions {
-	tam := make(access.Permissions)
+	perms := make(access.Permissions)
 
 	// Add the invoker's blessings and all its prefixes.
 	for _, p := range PrefixPatterns(blessings) {
 		for _, tag := range access.AllTypicalTags() {
-			tam.Add(p, string(tag))
+			perms.Add(p, string(tag))
 		}
 	}
-	return tam
+	return perms
 }
 
-// NilAuthPermissions creates an AccessList that mimics the default
-// authorization policy (i.e., the AccessList is matched by all blessings
-// that are either extensions of one of the local blessings or can be
-// extended to form one of the local blessings.)
+// NilAuthPermissions creates Permissions that mimics the default authorization
+// policy (i.e., Permissions is matched by all blessings that are either
+// extensions of one of the local blessings or can be extended to form one of
+// the local blessings.)
 func NilAuthPermissions(ctx *context.T, call security.Call) access.Permissions {
-	tam := make(access.Permissions)
+	perms := make(access.Permissions)
 	lb := security.LocalBlessingNames(ctx, call)
 	for _, p := range PrefixPatterns(lb) {
 		for _, tag := range access.AllTypicalTags() {
-			tam.Add(p, string(tag))
+			perms.Add(p, string(tag))
 		}
 	}
-	return tam
+	return perms
 }
diff --git a/services/internal/acls/version.go b/services/internal/pathperms/version.go
similarity index 65%
rename from services/internal/acls/version.go
rename to services/internal/pathperms/version.go
index 4b8839a..1cdf2d5 100644
--- a/services/internal/acls/version.go
+++ b/services/internal/pathperms/version.go
@@ -2,9 +2,7 @@
 // Use of this source code is governed by a BSD-style
 // license that can be found in the LICENSE file.
 
-// Package acls provides a library to assist servers implementing
-// GetPermissions/SetPermissions functions.
-package acls
+package pathperms
 
 import (
 	"bytes"
@@ -16,10 +14,10 @@
 
 // ComputeVersion produces the tag value returned by access.GetPermissions()
 // (per v23/services/permissions/service.vdl) that GetPermissions/SetPermissions
-// use to determine if the AccessLists have been asynchronously modified.
-func ComputeVersion(acl access.Permissions) (string, error) {
+// use to determine if the Permissions have been asynchronously modified.
+func ComputeVersion(perms access.Permissions) (string, error) {
 	b := new(bytes.Buffer)
-	if err := acl.WriteTo(b); err != nil {
+	if err := perms.WriteTo(b); err != nil {
 		return "", err
 	}
 
diff --git a/services/role/roled/internal/role_test.go b/services/role/roled/internal/role_test.go
index 630a715..28cce94 100644
--- a/services/role/roled/internal/role_test.go
+++ b/services/role/roled/internal/role_test.go
@@ -35,7 +35,7 @@
 	}
 	defer os.RemoveAll(workdir)
 
-	// Role A is a restricted role, i.e. it can be used in sensitive ACLs.
+	// Role A is a restricted role, i.e. it can be used in sensitive Permissions.
 	roleAConf := irole.Config{
 		Members: []security.BlessingPattern{
 			"root/users/user1/_role",
diff --git a/services/wspr/internal/namespace/namespace.vdl b/services/wspr/internal/namespace/namespace.vdl
index 9e06768..fba8427 100644
--- a/services/wspr/internal/namespace/namespace.vdl
+++ b/services/wspr/internal/namespace/namespace.vdl
@@ -36,9 +36,9 @@
 	// SetRoots sets the current mounttable roots.
 	SetRoots(roots []string) error
 	// SetPermissions sets the AccessList in a node in a mount table.
-	SetPermissions(name string, acl access.Permissions, version string) error
+	SetPermissions(name string, perms access.Permissions, version string) error
 	// GetPermissions returns the AccessList in a node in a mount table.
-	GetPermissions(name string) (acl access.Permissions, version string | error)
+	GetPermissions(name string) (perms access.Permissions, version string | error)
 	// Delete deletes the name from the mounttable and, if requested, any subtree.
 	Delete(name string, deleteSubtree bool) error
 }
diff --git a/services/wspr/internal/namespace/namespace.vdl.go b/services/wspr/internal/namespace/namespace.vdl.go
index e6550ef..ade1ee0 100644
--- a/services/wspr/internal/namespace/namespace.vdl.go
+++ b/services/wspr/internal/namespace/namespace.vdl.go
@@ -48,9 +48,9 @@
 	// SetRoots sets the current mounttable roots.
 	SetRoots(ctx *context.T, roots []string, opts ...rpc.CallOpt) error
 	// SetPermissions sets the AccessList in a node in a mount table.
-	SetPermissions(ctx *context.T, name string, acl access.Permissions, version string, opts ...rpc.CallOpt) error
+	SetPermissions(ctx *context.T, name string, perms access.Permissions, version string, opts ...rpc.CallOpt) error
 	// GetPermissions returns the AccessList in a node in a mount table.
-	GetPermissions(ctx *context.T, name string, opts ...rpc.CallOpt) (acl access.Permissions, version string, err error)
+	GetPermissions(ctx *context.T, name string, opts ...rpc.CallOpt) (perms access.Permissions, version string, err error)
 	// Delete deletes the name from the mounttable and, if requested, any subtree.
 	Delete(ctx *context.T, name string, deleteSubtree bool, opts ...rpc.CallOpt) error
 }
@@ -225,9 +225,9 @@
 	// SetRoots sets the current mounttable roots.
 	SetRoots(ctx *context.T, call rpc.ServerCall, roots []string) error
 	// SetPermissions sets the AccessList in a node in a mount table.
-	SetPermissions(ctx *context.T, call rpc.ServerCall, name string, acl access.Permissions, version string) error
+	SetPermissions(ctx *context.T, call rpc.ServerCall, name string, perms access.Permissions, version string) error
 	// GetPermissions returns the AccessList in a node in a mount table.
-	GetPermissions(ctx *context.T, call rpc.ServerCall, name string) (acl access.Permissions, version string, err error)
+	GetPermissions(ctx *context.T, call rpc.ServerCall, name string) (perms access.Permissions, version string, err error)
 	// Delete deletes the name from the mounttable and, if requested, any subtree.
 	Delete(ctx *context.T, call rpc.ServerCall, name string, deleteSubtree bool) error
 }
@@ -257,9 +257,9 @@
 	// SetRoots sets the current mounttable roots.
 	SetRoots(ctx *context.T, call rpc.ServerCall, roots []string) error
 	// SetPermissions sets the AccessList in a node in a mount table.
-	SetPermissions(ctx *context.T, call rpc.ServerCall, name string, acl access.Permissions, version string) error
+	SetPermissions(ctx *context.T, call rpc.ServerCall, name string, perms access.Permissions, version string) error
 	// GetPermissions returns the AccessList in a node in a mount table.
-	GetPermissions(ctx *context.T, call rpc.ServerCall, name string) (acl access.Permissions, version string, err error)
+	GetPermissions(ctx *context.T, call rpc.ServerCall, name string) (perms access.Permissions, version string, err error)
 	// Delete deletes the name from the mounttable and, if requested, any subtree.
 	Delete(ctx *context.T, call rpc.ServerCall, name string, deleteSubtree bool) error
 }
@@ -438,7 +438,7 @@
 			Doc:  "// SetPermissions sets the AccessList in a node in a mount table.",
 			InArgs: []rpc.ArgDesc{
 				{"name", ``},    // string
-				{"acl", ``},     // access.Permissions
+				{"perms", ``},   // access.Permissions
 				{"version", ``}, // string
 			},
 		},
@@ -449,7 +449,7 @@
 				{"name", ``}, // string
 			},
 			OutArgs: []rpc.ArgDesc{
-				{"acl", ``},     // access.Permissions
+				{"perms", ``},   // access.Permissions
 				{"version", ``}, // string
 			},
 		},
diff --git a/services/wspr/internal/namespace/request_handler.go b/services/wspr/internal/namespace/request_handler.go
index 8756061..c2cbc34 100644
--- a/services/wspr/internal/namespace/request_handler.go
+++ b/services/wspr/internal/namespace/request_handler.go
@@ -91,8 +91,8 @@
 	return nil
 }
 
-func (s *Server) SetPermissions(ctx *context.T, _ rpc.ServerCall, name string, acl access.Permissions, version string) error {
-	return s.ns.SetPermissions(ctx, name, acl, version)
+func (s *Server) SetPermissions(ctx *context.T, _ rpc.ServerCall, name string, perms access.Permissions, version string) error {
+	return s.ns.SetPermissions(ctx, name, perms, version)
 }
 
 func (s *Server) GetPermissions(ctx *context.T, _ rpc.ServerCall, name string) (access.Permissions, string, error) {