- Access control list (ACL)
- Attribute-based access control (ABAC)
- Bell–LaPadula model
- Biba model
- Brewer and Nash model
- Capability-based security
- Clark-Wilson model
- Context-based access control (CBAC)
- Graham-Denning model
- Harrison-Ruzzo-Ullman (HRU)
- High-water mark (computer security)
- Lattice-based access control (LBAC)
- Mandatory access control (MAC)
- Multi-level security (MLS)
- Non-interference (security)
- Object-capability model
- Protection ring
- Role-based access control (RBAC)
- Take-grant protection model
- Discretionary access control (DAC)