• A Role-based access control
  • B Mandatory access control
  • C Discretionary access control
  • D Biometric access control