Figure: Use case example of access control system