user should have access but restricted (no implicit) and independent of other users
Related Topics
Topic: security by access rights (36 items)