The security policies consisting of MAC, Clark Wilson, LOMAC and ABAC, as proposed in this
research, are implemented and devised using ACPT by specifying the attributes for subject, resource,
actions, environmental attributes and the associated permission.