05.01.2013 Views

Questions?

Questions?

Questions?

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CONTEXT FORMALIZATION CHANNELS, FLOWS AND LABELS WRAP-UP<br />

From Security Lattice to Flow Lattice<br />

Flow lattice:<br />

describes allowed information flows: x := y iff ly ≤ lx<br />

Flow lattice = confidentiality lattice × inverse of integrity lattice<br />

�<br />

Some always talk about integrity lattice in inverse mode<br />

Trusted ≤ Untrusted<br />

G. Le Guernic DD2460 (III, L1): Information Flow Security 28/35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!