A system administrator needs to implement an access control scheme that will allow an object’s access policy be determined by its owner.
Which of the following access control schemes BEST fits the requirements?
A . Role-based access control
B . Discretionary access control
C . Mandatory access control
D . Attribute-based access control
Answer: B