“…Intuitively, to establish that information does not flow from high to low it is sufficient to establish that high behavior has no effect on what low level users can observe, i.e., the low level view of the system is independent of high behavior. Noninterference has been further developed in different settings such as programming languages [38,36,35,3], trace models [20,21], process calculi [30,28,33,8,6,14], probabilistic models [2,7], timed models [13], cryptographic protocols [1,9,4].…”