To prove eligibility to access an object, a subject has to present a valid credential, stating subject's security label. All access rights are divided into read-class and write-class. Appropriate rules are applied to each class. Generic conditions for read-class access rights: a) conf_read_equal:cofidentiality_label This condition specifies that a subject, wishing to get read-class access to the object has to have security clearance equal to the one, specified in the cofidentiality_label field. b) conf_read_below:cofidentiality_label This condition is used to enforce read down mandatory confidentiality rule. It specifies that a subject, wishing to get read-class access to the object has to have security clearance no less the one, specified in the cofidentiality_label field. c) integr_read_equal:integrity_label This condition specifies that a subject, wishing to get read-class access to the object has to have security clearance equal to the one, specified in the integrity_label field. d) integr_read_above:integrity_label This condition is used to enforce read up mandatory integrity rule. It specifies that a subject, wishing to get read-class access to the object has to have integrity clearance less or equal to the one, specified in the integrity_label field. Similarly we define generic conditions for write-class access rights. Assume file doc.txt has classification Sensitive/Departmen1 and integrity label Medium, then EACL for this file can be specified as: