Page
%P
-
Article
Symbolic algorithmic verification of intransitive generalized noninterference
Generalized noninterference can be used to formulate transitive security policies, but is unsuitable for intransitive security policies. We propose a new information flow security property, which we call intra...