An algorithmic approach to verification of intransitive non-interference in security policies | IEEE Conference Publication | IEEE Xplore