Comparison of Security Models Discussion