This document discusses different methodologies for access control and their interactions. It begins by introducing access control as a major security component for organizations to implement regulatory constraints. It then describes several common access control models in more detail, including Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC). MAC controls access based on a system-wide security policy, while DAC allows individual users some control over access permissions. The document analyzes advantages and limitations of each model and their suitability for different environments.