Skip to main content

and
  1. No Access

    Article

    Symbolic algorithmic verification of intransitive generalized noninterference

    Generalized noninterference can be used to formulate transitive security policies, but is unsuitable for intransitive security policies. We propose a new information flow security property, which we call intra...

    CongHua Zhou, ZhiFeng Liu, HaiLing Wu, Song Chen in Science China Information Sciences (2012)