• A User Access Control
  • B Mandatory Access Control
  • C Role-based Access Control
  • D Discretionary Access Control