Approaches To Computer Security, Access Control, And Authentication