13 research outputs found

    Modifying Security Policies for the Satisfaction of Intransitive Non-Interference

    No full text

    An algorithmic approach to verification of intransitive non-interference in security policies

    No full text

    On the Verification of Intransitive Noninterference in Mulitlevel Security

    No full text
    corecore