%PDF-1.5
%
4 0 obj
<< /S /GoTo /D (section.1) >>
endobj
7 0 obj
(Introduction)
endobj
8 0 obj
<< /S /GoTo /D (section.2) >>
endobj
11 0 obj
(Policy Language Abstraction)
endobj
12 0 obj
<< /S /GoTo /D (section.3) >>
endobj
15 0 obj
(High-level Security Policy)
endobj
16 0 obj
<< /S /GoTo /D (subsection.3.1) >>
endobj
19 0 obj
(Examples of HSPL)
endobj
20 0 obj
<< /S /GoTo /D (section.4) >>
endobj
23 0 obj
(Medium-level Security Policy)
endobj
24 0 obj
<< /S /GoTo /D (subsection.4.1) >>
endobj
27 0 obj
(Filtering MSPL)
endobj
28 0 obj
<< /S /GoTo /D (subsubsection.4.1.1) >>
endobj
31 0 obj
(Data protection configuration)
endobj
32 0 obj
<< /S /GoTo /D (section.5) >>
endobj
35 0 obj
(Related Work)
endobj
36 0 obj
<< /S /GoTo /D (section.6) >>
endobj
39 0 obj
(Conclusion)
endobj
40 0 obj
<< /S /GoTo /D [41 0 R /Fit] >>
endobj
45 0 obj
<<
/Length 2931
/Filter /FlateDecode
>>
stream
xڵYIܶWv""[(m)/h67qxS*^r"Q(l~<ݳ~_Ğ̄I{R"ͼ,*"ͰStCevJBv2#nM9H]];ܾMYCU݇iPa!q"J D窣)~I)}]wDvx,νH)$<[WQB EG^ EJTJȢ qݲ^S.~@~W+Q˓QRH$q9v+ɔmUꇊwuXo.
nqsϠz5Or?̿
?_̢ͤk'Rر"G_=o|wssbۤب:IoqmÉ1;bB.)e!p֣;QM1W$UcT43>8
3a'V* Mpw2 J(E??%96G@xS
sLCWǃaXcj\4}mŘ`zWHxs{08unGNx GwƯis0 +a>hxauH3
\
kǪGH,wsrZDdc>Ʈ#q:U/'=~$t4DmfQH3
pv+3TE܃Ïy$P"V851I،y
q08Q[G@ #H>
Ս) C*05
YSlϫ۟QD$?͡m20}} GHq&yAȿz0$YdBڙHY@bsGgbՇ/=)AGa?*/|M';×Ds*\B6㪭2؍EtA
[/s4rB'G)ƹ