Access control is mediated by a set of 2-tuple labels or attributes which
are associated with subject and object entities, respectively. Subject
entitles, such as processes, have separate read and write attributes,
while object entities, such as files, have separate integrity and write
control attributes. The system implements a set of rules to provide both
integrity control and confidentiality protection. Specifically, write
operations to an object are inhibited where the subject's write attribute
is lower than the write control attribute of the object. Read operations
from an object are inhibited where the subject's read attribute is lower
than the object's integrity attribute. When a subject reads from an
object having a lower integrity level than the subject's read attribute,
the subject's read attribute is demoted.