On information flow security models | IEEE Conference Publication | IEEE Xplore