메뉴 건너뛰기




Volumn 15, Issue 12, 2004, Pages 1837-1849

Covert channel analysis in secure operating systems with high security levels

Author keywords

Covert channel analysis; Information flow; Secure operating system; Storage channel; Timing channel

Indexed keywords

CALCULATIONS; COMMUNICATION CHANNELS (INFORMATION THEORY); DATA FLOW ANALYSIS; MEASUREMENTS; SECURITY OF DATA; SEMANTICS;

EID: 12844265899     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (19)

References (28)
  • 1
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson BW. A note on the confinement problem. CACM, 1973, 16(10).
    • (1973) CACM , vol.16 , Issue.10
    • Lampson, B.W.1
  • 3
    • 0010512569 scopus 로고
    • A guide to understanding covert channel analysis of trusted system
    • NCSC, NCSC-TG-030
    • NCSC. A guide to understanding covert channel analysis of trusted system, NCSC-TG-030, 1993.
    • (1993)
  • 4
    • 0003969633 scopus 로고
    • Trusted computer system evaluation criteria
    • U.S. Department of Defense, DoD 5200.28-STD
    • U.S. Department of Defense. Trusted Computer System Evaluation Criteria, DoD 5200.28-STD. 1985.
    • (1985)
  • 6
    • 12844272487 scopus 로고
    • Covert communication channels in time sharing systems
    • Technical Report UCB-CS-78-02
    • Huskamp JC. Covert communication channels in time sharing systems. Technical Report UCB-CS-78-02, 1978.
    • (1978)
    • Huskamp, J.C.1
  • 7
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • Kemmerer RA. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. on Computer Systems, 1983. 256-277.
    • (1983) ACM Trans. on Computer Systems , pp. 256-277
    • Kemmerer, R.A.1
  • 9
    • 84945721946 scopus 로고
    • A comment on the confinement problem
    • Lipner SB. A comment on the confinement problem. Operating Systems Review, 1975. 192-196.
    • (1975) Operating Systems Review , pp. 192-196
    • Lipner, S.B.1
  • 13
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning DE. A lattice model of secure information flow. Communications of the ACM, 1976. 236-243.
    • (1976) Communications of the ACM , pp. 236-243
    • Denning, D.E.1
  • 14
    • 0025641510 scopus 로고
    • Information flow analysis for covert-channel identification in multilevel secure operating systems
    • He J, Gligor VD. Information flow analysis for covert-channel identification in multilevel secure operating systems. In: Proc. of the 3rd IEEE Workshop on Computer Security Foundations. 1990. 139-148.
    • (1990) Proc. of the 3rd IEEE Workshop on Computer Security Foundations , pp. 139-148
    • He, J.1    Gligor, V.D.2
  • 15
    • 0003562729 scopus 로고
    • A technique for proving specifications are multilevel secure
    • Technical Report CSL-109
    • Feiertag R. A technique for proving specifications are multilevel secure. Technical Report CSL-109, 1980.
    • (1980)
    • Feiertag, R.1
  • 18
    • 12844249101 scopus 로고
    • Foundations of covert-channel detection
    • Technical Report MTR-10538, The MITRE Corporation
    • Millen JK. Foundations of covert-channel detection. Technical Report MTR-10538, The MITRE Corporation, 1989.
    • (1989)
    • Millen, J.K.1
  • 22
  • 24
    • 0032714529 scopus 로고    scopus 로고
    • Estimating and measuring covert channels bandwidth in multilevel secure operating system
    • Shieh SP. Estimating and measuring covert channels bandwidth in multilevel secure operating system. Journal of Information Science and Engineering, 1999, 15: 91-106.
    • (1999) Journal of Information Science and Engineering , vol.15 , pp. 91-106
    • Shieh, S.P.1
  • 28
    • 12844285318 scopus 로고    scopus 로고


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.