As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
Given a program P and a security policy Φ, this paper gives an approach allowing to generate another program P′ that respects the policy Φ and behaves (with respect to trace equivalence) like P except that it stops when P try to execute an action that violate the security policy. The proposed approach transform the problem of finding P′ to solving linear systems under a given algebra and for which we know how to get the solution.