You may need to decide which type of access control (mandatory access, discretionary access control, and role-based access control) to be implemented and enforced. Here are some articles that may help:
Osborn, S., Sandhu, R., & Munawer, Q. (2000). Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security (TISSEC), 3(2), 85-106.
Hu, H., & Ahn, G. (2008, June). Enabling verification and conformance testing for access control model. In Proceedings of the 13th ACM symposium on Access control models and technologies (pp. 195-204). ACM.
Hu, H., & Ahn, G. (2008, June). Enabling verification and conformance testing for access control model. In Proceedings of the 13th ACM symposium on Access control models and technologies (pp. 195-204). ACM.