Making security invisible with adaptive access management