Allen aims to safeguard his website from potential SQL injection attacks. To achieve this, he opts for a method where only an approved set of elements, including the data type, scope, dimensions, and content, is permitted for secure access. What approach is he planning to implement among the following options?