Study on the access control model | IEEE Conference Publication | IEEE Xplore