15.15. Another Example: Using MAC to Constrain a Web Server