A mandatory access control method for securing an operating system is
presented. A first integrity subject reads a first object. The first
integrity subject attempts to read a second object. It is determined that
a conflict exists between the first and second objects. At least one
security rule is applied to the conflict between the first and the second
objects.