Summary
In this chapter, we explored how we can model access control in graphs. While we have created access groups according to the region, there might be different parameters on which we can create access groups. We also explored how to use the groups and accessible hotels to find which hotels are accessible to a particular employee.
In the next chapter, you will learn how to recommend hotels to travelers and analyzing data using Cypher.