For the above mentioned reasons, adopting the access control philosophy of UCON, which controls the usage before, during, and after connections, would substantially enhance the access control on the system objects. These UCON benefits are manifested through its ability to specify and enforce usage policies not only before access, but also during the access and after the task are completed