Role-Based Access Control, or RBAC, assigns permissions to roles rather than individuals, and users receive access by being assigned to roles matching their job functions. Discretionary Access Control, or DAC, lets the resource owner decide who can access their resources, common in operating systems where file owners set permissions. Mandatory Access Control, or MAC, assigns security labels to both subjects and objects, and the system enforces access based on label comparison rather than owner discretion, common in military environments. RBAC is the most widely used in enterprises.