Watch this video on YouTube
Which access control model determines permissions based on a predefined set of protocols that system administrators establish, often using conditions or constraints?