Which access control model originates from the military and uses security labels?
A. access control list
B. discretionary access control
C. mandatory access control
D. role-based access control
Which access control model originates from the military and uses security labels?
A. access control list
B. discretionary access control
C. mandatory access control
D. role-based access control