Matthew is the security administrator for a consulting firm and
must enforce access controls that restrict users’ access based upon
their previous activity. For example, once a consultant accesses
data belonging to Acme Cola, a consulting client, they may no
longer access data belonging to any of Acme’s competitors. What
security model best fits Matthew’s needs?
Select one of the following: