Access control is used to regulate the actions performed by the subjects on the objects. An effective access control mechanism is crucial in protecting the system resources. Some of the well-known access control models include Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Attribute Based Access Control (ABAC). Each of these models has its own advantages and drawbacks. Our goal is to develop an access control model which is scalable, flexible, efficient, auditable, flow-secure, and yet easy to use.