THE method of policy based management is widely used to manage complex and large scale network systems. The traditional framework of policy based management consists of four core components: PDP (Policy Decision Point), PEP (Policy Enforcement Point), PAP (Policy Administration Point) and PR (Policy Repository). A well-trained policy administrator or group will specify, verify policies in PAP, and deploy the policies in PR. After a system runs, PDP will retrieve applicable policies from PR, and make decisions. PEP takes charge of the decision. The over claim of privileges, a not well-trained administrator assigns more privileges than those are required of a subject, is a increasingly serious problem, especially when the method of policy based management is applied to emerging application scenarios, such as mobile applications and social network services. the developers usually declare more permissions than necessary because they are inclined to make the development of applications easier, or even misunderstand technical documents; the marketers usually tend to allow more applications regardless of the malicious permission requests; and the application users may not know what the requested permissions mean, thus approving all requests because they are eager to use the application. This challenge to policy administration is increasing serious due to the explosion of these applications. Among all smart phones shipped during the second quarter, Android OS smart phones had the largest global market share (68.1%). Social network services have become one of the most popular web applications in the world. The proposed collaborative policy administration includes two main stages: collaborative policy design and collaborative policy verification