An access control matrix is placing the names as ________.
1) Users in each row and the names of objects in each column
2) Programs in each row and the names of users in each column
3) Users in each column and the names of devices in each row
4) Subjects in each column and the names of process in each row