Which security mechanism uses a unique list that meets the following specifications?
The list is embedded directly in the object itself
The list defines which subjects have access to certain objects
The list specifies the level or type of access allowed to certain objects
A. Hasing
B. Kerberos
C. User ACL
D. Mandatory access control"