Which of the following are the primary components of a discretionary access control (DAC) model?