To implement an access control list in which only authorized users have access to the resource:
A. Grant access to all users
B. Grant access to a random subset of users
C. Grant access to specifically authorized users
D. Grant access based on user popularity