analyze and compare the access control models in terms of how access control lists (acl) are written and determine which statement accurately explains the discretionary access control (dac) model.

ACCESS MORE