An Access Control that considers:

  • User role
  • Time constraints
  • Network access restraints