Existing Access Control Schemes Research Articles