How can ACF2 be used to protect access to DB2, but not to protect the DB2 resources?