decades. However, existing definitions are inconsistent and even contradicting each other.
Furthermore, there are numerous access control models and even more have recently
evolved to conform with the challenging requirements of resource protection. That makes it
hard to classify the models and decide for an appropriate one satisfying security needs.
Therefore, this study aims to guide through the plenty of access control models in the current …