Which access control model uses Access Control Lists to identify the users who have permissions
to a resource?
A.
MAC
B.
RBAC
C.
DAC
D.
None of the above.
Which access control model uses Access Control Lists to identify the users who have permissions
to a resource?
Which access control model uses Access Control Lists to identify the users who have permissions
to a resource?
A.
MAC
B.
RBAC
C.
DAC
D.
None of the above.