Analyzing temporal role based access control models