Implementation of the access rules defined in the previous activity. This can be helped by using security patterns