Watch this video on YouTube
Which access control model emphasizes the enforcement of well-formed transactions and separation of duties to ensure data integrity?