Access control models can be used to regulate controls through their capabilities of supporting
segregations and integrity of different levels of information belonging to multiple parties [8]. The most
basic and fundamental access control models are discretionary access control (DAC), mandatory access
control (MAC), role-based access control (RBAC) and attribute-based access control (ABAC). In general,
security models provide access authorization based on the specification and enforcing of security policies.
The common security models are Bell-La Padula model, BIBA model, Clark Wilson Integrity Model and
Chinese Wall Model. Muthukumaran.et al. proposed a multilevel security (MLS) system comprised
of both MAC and Clark Wilson model. Low Water Mark access control (LOMAC) is introduced into the
proposed solution.