<P> ACL algorithms have been ported to SQL and to relational database systems . Many "modern" (2000s and 2010s) SQL - based systems, like enterprise resource planning and content management systems, have used ACL models in their administration modules . </P> <P> The main alternative to the ACL model is the role - based access control (RBAC) model . A "minimal RBAC model", RBACm, can be compared with an ACL mechanism, ACLg, where only groups are permitted as entries in the ACL . Barkley (1997) showed that RBACm and ACLg are equivalent . </P> <P> In modern SQL implementations, ACL also manage groups and inheritance in a hierarchy of groups . So "modern ACLs" can express all that RBAC express, and are notably powerful (compared to "old ACLs") in their ability to express access control policy in terms of the way in which administrators view organizations . </P> <P> For data interchange, and for "high level comparisons", ACL data can be translated to XACML . </P>

List the three most common access rights that might be set up on a network