Name:time, location, function, and other similar access limitations
Access is restricted based on time, location, function, and
other characterizable parameters. Examples include time locks on bank
vaults, access controls based on IP address, terminal port, or combinations
of these, and barriers which require some time in order to be bypassed.
Complexity: The only real complexity issue is in identifying the proper sets
of controls over the conditions for access and non-access for each
individual relating to each system.