Research Article

A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification

Algorithm 1

QEILCM ().
Input: array : each item records a subject’s levels and capabilities. : sum of the subjects. : set of mutually exclusive tags constraints.
Output: if can reach , then print the path; else print “unreachable.”
QEILCM ()
{
   
   if
   then;
else ; }
Backtrack (depth, u, curpath, pathlen)
{ if return 0;
    if not return 1;
    ifreturn 0;
for
{ ifcontinue;
if
continue;
;
;.
ifreturn 1;
;.
; }
return 0; }