Most programmers use this implicit graph without awareness of its existence and use an ACL structure for access control. However, in building n-tier (Web-based) applications, an explicit graph makes ...