To implement an access control list in which only authorized users have access to the resource:
A. Grant access to all users B. Grant access to a random subset of users C. Grant access to specifically authorized users D. Grant access based on user popularity