Login / Signup

An algorithmic approach to verification of intransitive non-interference in security policies.

Nejib Ben Hadj-AlouaneStéphane LafranceFeng LinJohn MullinsMoez Yeddes
Published in: CDC (2004)
Keyphrases