The Application of Graph Theory to Access Control Systems