Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item.
A.
MACs (Mandatory Access Control) method
B.
RBACs (Role Based Access Control) method
C.
LBACs (List Based Access Control) method
D.
DACs (Discretionary Access Control) method