Consider the following system enforcing Biba's strict integrity policy for a software vendor.
The defined integrity levels for an access class are released (rel) > beta > demonstration (demo). The defined set of integrity categories are {internal, partner, customer} or {in, pa, cu}.
Consider a subject with an access class of (beta, {in, pa} ).
a)Can this subject read an object with an access class of (beta, {pa, cu} )?
b)Can this subject read an object with an access class of (rel, {pa, cu} )?
c)Can this subject read an object with an access class of (demo, {pa} )?
d)Can this subject write an object with an access class of (beta, {pa, cu} )?
e)Can this subject write an object with an access class of (rel, {cu} )?
f)Can this subject write to an object with an access class of (beta, {in,cu})
g)Can this subject invoke a subject with an access class of (beta, {in,pa} )?
h)Can this subject invoke a subject with an access class of (rel, {in, pa} )?
i)Can this subject invoke a subject with an access class of (demo, {in, pa, cu})?
j)Can this subject write an object with an access class of (demo, {in, pa, cu})?