Just curious, what are you checking with your security object actually?
We are using remoting also, and we use rolebased security, and do security assertions at server when something happens. We let windows and IIS to provide us with the identity of the user (so we support windows authentication and digest).
I see that here is a problem with a hacked client which provides tampered data with correct authentication. We do validate the data at serverside, using llblgen validation schema, but other than that, what can you do?
Also, another interesting issue regarding security is what should you do with returning data. Most security schemas only try to prevent something to be done, but if you would really like to be sure, you should also validate the data which is returned from the server - is the client authorized to get the data or not (despite the fact that client was authorized to call the method in the first place) . I have seen this kind of things implemented in some banking/insurance systems.