Frаnk is а security аdministratоr fоr a large cоmpany. Occasionally, a user needs to access a specific resource that they don't have permission to access. Which access control methodology would be most helpful in this situation?