Using Security Labels
This section contains the following topics:
Introduction
Determining MLS Access
Entering the System
Verifying User Access to An Object
Access Classified Data Sets
Sending Messages, Mail, and Data Sets
Delete Data Sets
Create Data Sets
Renaming Data Sets
Copy Data Sets
Accessing Classified z/UNIX Files and Directories