A
user-data constraint
defines whether a resource is accessed with:
Confidentiality protection
Integrity protection
No protection