메뉴 건너뛰기




Volumn 16, Issue 6, 1990, Pages 569-580

On the Identification of Covert Storage Channels in Secure Systems

Author keywords

Covert channels; information flow; nondiscretionary security; source code; top level specifications

Indexed keywords

PROBABILITY;

EID: 0025438147     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/32.55086     Document Type: Article
Times cited : (53)

References (28)
  • 1
    • 0016555241 scopus 로고
    • The protection and control of information sharing in computer systems
    • Sept.
    • J. H. Saltzer and M. Schroeder, “The protection and control of information sharing in computer systems,” Proc. IEEE, vol. 63, no. 9, Sept. 1975.
    • (1975) Proc. IEEE , vol.63 , Issue.9
    • Saltzer, J.H.1    Schroeder, M.2
  • 2
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning, “A lattice model of secure information flow,” Commun. ACM, vol. 19, no. 5, pp. 236–243, May 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 4
    • 77952249782 scopus 로고
    • Honeywell Information Systems, Inc., HQ Electronic Systems Division, Hanscom AFB, MA, Tech. Rep. ESD-TR-74-176, Dec.
    • J. Whitmore et al., “Design for multics security enhancements,” Honeywell Information Systems, Inc., HQ Electronic Systems Division, Hanscom AFB, MA, Tech. Rep. ESD-TR-74-176, Dec. 1973.
    • (1973) Design for multics security enhancements
    • Whitmore, J.1
  • 5
    • 84958951541 scopus 로고
    • Program confinement in KVM/370
    • Seattle, WA. New York: ACM, Oct.
    • M. Schaefer, B. Gold, R. Linde, and J. Scheid, “Program confinement in KVM/370,” in Proc. 1977 Annu. ACM Conf., Seattle, WA. New York: ACM, Oct. 1977, pp. 404–410.
    • (1977) Proc. 1977 Annu. ACM Conf. , pp. 404-410
    • Schaefer, M.1    Gold, B.2    Linde, R.3    Scheid, J.4
  • 6
    • 15944417953 scopus 로고
    • KSOS development methodology for a secure operating system
    • New York, June
    • T. A. Berson and G. L. Barksdale, “KSOS development methodology for a secure operating system,” in Proc. Nat. Comput. Conf., New York, June 1979.
    • (1979) Proc. Nat. Comput. Conf.
    • Berson, T.A.1    Barksdale, G.L.2
  • 7
    • 0020778471 scopus 로고
    • SCOMP: A solution to the multilevel security problem
    • July
    • L. J. Fraim, “SCOMP: A solution to the multilevel security problem,” Computer, pp. 26–34, July 1983.
    • (1983) Computer , pp. 26-34
    • Fraim, L.J.1
  • 8
    • 84941520546 scopus 로고
    • SE/VMS: Implementing mandatory security in VAX/VMS
    • Gaithersburg, MD, Sept.
    • S. Blotcky, K. Lynch, and S. Lipner, “SE/VMS: Implementing mandatory security in VAX/VMS,” in Proc. 9th Nat. Comput. Security Conf., Gaithersburg, MD, Sept. 1986, pp. 47–54.
    • (1986) Proc. 9th Nat. Comput. Security Conf. , pp. 47-54
    • Blotcky, S.1    Lynch, K.2    Lipner, S.3
  • 9
    • 0023293654 scopus 로고
    • Design and implementation of secure Xenix
    • Feb.
    • V. D. Gligor et al., “Design and implementation of secure Xenix,” IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 208–221, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.SE-13 , Issue.2 , pp. 208-221
    • Gligor, V.D.1
  • 10
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct.
    • B. W. Lampson, “A note on the confinement problem,” Commun. ACM, vol. 16, no. 10, pp. 842–856, Oct. 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 842-856
    • Lampson, B.W.1
  • 11
    • 84945721946 scopus 로고
    • A comment on the confinement problem
    • Nov.
    • S. B. Lipner, “A comment on the confinement problem,” ACM Operat. Syst. Rev., vol. 9, no. 5, pp. 192–196, Nov. 1975.
    • (1975) ACM Operat. Syst. Rev. , vol.9 , Issue.5 , pp. 192-196
    • Lipner, S.B.1
  • 13
  • 15
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • USAF Electron. Syst. Division. Bedford, MA, Tech. Rep. ESD-TR-76, 372, Apr.
    • K. J. Biba, “Integrity considerations for secure computer systems,” USAF Electron. Syst. Division. Bedford, MA, Tech. Rep. ESD-TR-76, 372, Apr. 1977.
    • (1977)
    • Biba, K.J.1
  • 16
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Oakland, CA, Apr.
    • D. D. Clark and D. R. Wilson, “A comparison of commercial and military computer security policies,” in Proc. 1987 IEEE Symp. Security and Privacy, Oakland, CA, Apr. 1987, pp. 184–194.
    • (1987) Proc. 1987 IEEE Symp. Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 17
    • 0016951438 scopus 로고
    • Security kernel validation in practice
    • May
    • J. K. Millen, “Security kernel validation in practice,” Commun. ACM, vol. 19, no. 5, pp. 243–250, May 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 243-250
    • Millen, J.K.1
  • 18
    • 0023292228 scopus 로고
    • An experience using two covert channel analysis techniques on a real system design
    • Feb.
    • T.J. Haigh et al., “An experience using two covert channel analysis techniques on a real system design,” IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 157–168, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.SE-13 , Issue.2 , pp. 157-168
    • Haigh, T.J.1
  • 19
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • Aug.
    • R. A. Kemmerer, “Shared resource matrix methodology: An approach to identifying storage and timing channels,” ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 256–277, Aug. 1983.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 22
    • 0024665833 scopus 로고
    • Symbol security condition considered harmful
    • Oakland, CA, Apr.
    • M. Schaefer, “Symbol security condition considered harmful,” in Proc. 1989 IEEE Symp. Security and Privacy, Oakland, CA, Apr. 1989, pp. 20–46.
    • (1989) Proc. 1989 IEEE Symp. Security and Privacy , pp. 20-46
    • Schaefer, M.1
  • 24
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning, “Certification of programs for secure information flow,” Commun. ACM, vol. 20, no. 7, pp. 504–513, July 1977.
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 25
    • 84976840591 scopus 로고
    • An axiomatic approach to information flow in programs
    • Jan.
    • G. R. Andrews and R. P. Reitman, “An axiomatic approach to information flow in programs,” ACM Trans. Program. Lang. Syst., vol. 2, no. 1, pp. 56–76, Jan. 1980.
    • (1980) ACM Trans. Program. Lang. Syst. , vol.2 , Issue.1 , pp. 56-76
    • Andrews, G.R.1    Reitman, R.P.2
  • 26
    • 84939705863 scopus 로고
    • The interpretation of the Bell-LaPadula model in Secure Xenix
    • Gaithersburg, MD, Sept.
    • G. Luckenbaugh et al., “The interpretation of the Bell-LaPadula model in Secure Xenix,” in Proc. 9th DOD/NBS Nat. Computer Security Conf., Gaithersburg, MD, Sept. 1986, pp. 113–125.
    • (1986) Proc. 9th DOD/NBS Nat. Computer Security Conf. , pp. 113-125
    • Luckenbaugh, G.1
  • 27
    • 84941520098 scopus 로고
    • Resolving covert channels within a B2 class secure system
    • July
    • K. Loepere, “Resolving covert channels within a B2 class secure system,” ACM Operating Syst. Rev., vol. 19, no. 3, pp. 4–28, July 1985.
    • (1985) ACM Operating Syst. Rev. , vol.19 , Issue.3 , pp. 4-28
    • Loepere, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.