Previous Topic: Physical Security AssumptionsNext Topic: Introduction


Using Security Labels

This section contains the following topics:

Introduction

Determining MLS Access

Entering the System

Verifying User Access to An Object

Access Classified Data Sets

Sending Messages, Mail, and Data Sets

Delete Data Sets

Create Data Sets

Renaming Data Sets

Copy Data Sets

Accessing Classified z/UNIX Files and Directories