Given a program P and a security policy Φ, this paper gives an approach allowing to generate another program P′ that respects the policy Φ and behaves (with respect to trace equivalence) like P except that it stops when P try to execute an action that violate the security policy. The proposed approach transform the problem of finding P′ to solving linear systems under a given algebra and for which we know how to get the solution.
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
Tel.: +1 703 830 6300
Fax: +1 703 830 2300 firstname.lastname@example.org
(Corporate matters and books only) IOS Press c/o Accucoms US, Inc.
For North America Sales and Customer Service
West Point Commons
Lansdale PA 19446
Tel.: +1 866 855 8967
Fax: +1 215 660 5042 email@example.com