One of the most common techniques of access control (Fig. 5.2) is access matrix. Rows of the matrix represent user options and columns represent user objects. This technique is often referred as Access Control List (ACL) [12].
Content-Dependent Access Control is a further extension technique in which one user can access more detailed information or data object as a different user. This decision may depend on factors such as age, used terminal, accesses point, user’s access IP address and the time.