Research Article
A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification
Table 1
Setting of initial labels and capabilities of subject and object by EILCM system.
| Subjects | Secrecy label | Integrity label | Capabilities | Objects | Secrecy label | Integrity label |
| IM | | | | IM data | | | MN | | | | MN data | | | Email | | | | ETP data | | | Killer | | | | OS config files | | | UC | | | | Download data | | | Explorer | | | | OS Updated packages | | |
|
|