Безопасность информационных технологий (Sep 2010)
Low-level Data Processing Policy
Abstract
In this paper we propose a formal way of describing low-level confidential data processing constraints and show how constraints thus expressed can be verified.