Author:
Zhang Fan,Zhang Cong,Xu Mingdi,Liu Xiaoli,Hu Fangning,Chao HanChieh
Publisher
Springer International Publishing
Reference21 articles.
1. Goguen, J., Meseguer, J.: Security policies and security models. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 11–20. IEEE, Oakland (1982)
2. Haigh, J., Young, W.: Extending the noninterference version of MLS for SAT. IEEE Trans. Softw. Eng. SE-13(2), 141–150 (1987)
3. Rushby, J.: Noninterference, transitivity, and channel control security policies. SRI International. Technical report CSL-92-02, December 1992.
http://www.csl.sri.com/papers/csl-92-2/
4. Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., Yeddes, M.: On the verification of intransitive noninterference in multilevel security. IEEE Trans. on Syst. Man Cybern. Part B 35(5), 948–958 (2005)
5. Eggert, S., Meyden, R.V.D., Schnoor, H., Wilke, T.: The complexity of intransitive noninterference. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 196–211. IEEE, Oakland (2011)