When designing an access control
When designing an access control, we are acutally managing security
between ______________ and _______________. Fill in the blanks.
Question 57 options:
Data and object
Subject and object
Data Sensitivity and Value
Owner and users