"Most users perform access control by employing concepts such as roles and permissions." . . . . .