Questions?
Questions?
Questions?
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CONTEXT FORMALIZATION CHANNELS, FLOWS AND LABELS WRAP-UP<br />
From Security Lattice to Flow Lattice<br />
Flow lattice:<br />
describes allowed information flows: x := y iff ly ≤ lx<br />
Flow lattice = confidentiality lattice × inverse of integrity lattice<br />
�<br />
Some always talk about integrity lattice in inverse mode<br />
Trusted ≤ Untrusted<br />
G. Le Guernic DD2460 (III, L1): Information Flow Security 28/35