The [security] label of an entity x (process, … is denoted C(x). … [p. 675] Data flow results from system calls. In … flows from source x to destination y, it … x (or y) belongs to file system z, … x must satisfy L(x,t_1) <= L(x,t_2) for t_1<=t_2. … The ceiling of a mounted file system cannot …
Google-1
Google-2
Copyright clearance needed for quotation.