<s>
A	O
transition	B-Application
constraint	I-Application
is	O
a	O
way	O
of	O
enforcing	O
that	O
the	O
data	O
does	O
not	O
enter	O
an	O
impossible	O
state	O
because	O
of	O
a	O
previous	O
state	O
.	O
</s>
<s>
In	O
formal	O
models	O
in	O
computer	O
security	O
,	O
a	O
transition	B-Application
constraint	I-Application
is	O
a	O
property	O
that	O
governs	O
every	O
valid	O
transition	O
from	O
a	O
state	O
of	O
the	O
model	O
to	O
a	O
successor	O
state	O
.	O
</s>
