Which of the following should be implemented to automate the selection of the BEST security association for each user?
A security system that uses labels to identify objects and requires formal authorization to use is BEST described as: