The access matrix model has which of the following common implementations?

A.
Access control lists and capabilities.
B.
Access control lists.
C.
Capabilities.
D.
Access control list and availability.
Explanation:
The two most used implementations are access control lists and capabilities. Access control lists are
achieved by placing on each object a list of users and their associated rights to that object.