A logical analysis of authorized and prohibited information flows | IEEE Conference Publication | IEEE Xplore