Rather than giving high-level employees high-level access to sensitive resources, employees are given access based on the tasks they must complete as part of their job. Access rules are based on the balance of confidentiality and necessity. In this sense, the _______________ model is similar to the role-based access control (RBAC) model.