Which of the following security methods is used when the code requires a specific set of permissions, which are not known until runtime?