Your author discusses four different access models, but there is a fifth that
is gaining interest, particularly in a cloud environment. Read through the TBAC
attachment:”sacmat08-task.pdf” (or find additional resources), then complete
the following for each of the five models:

  • Provide a brief description of the model.
  • Provide a scenario where the model would be the optimal choice for access
    control, and why.
  • Provide a scenario where the model is the least optimal choice for access
    control, and why.

Another link that may help

http://www.hightechinthehub.com/2011/08/task-based-access-control-in-the-cloud/