Abstract: The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results