In the Lattice Based Access Control model, controls are applied to:

A.
Scripts
B.
Objects
C.
Models
D.
Factors
Explanation:
Information flow is clearly central to confidentiality but to some extent it also applies to integrity.
The basic work in this area was done around 1970 and was driven mostly by the defense sector.
Information flow in computer systems is concerned with flow from one security class (also called
security label) to another. These controls are applied to objects. An object is a container of
information, and an object can be a directory or file.