Can be based on:
permissions,
tokens.
Various coordinators.
Access is attributed to the majority of votes.
Last updated 2 years ago