|
Volumn 29, Issue 8, 2006, Pages 1460-1467
|
State-based approach to information flow analysis
|
Author keywords
Confidentiality; Covert channel; Finite automata; Hidden information flow; Secure operating system
|
Indexed keywords
ACTION RULES;
AUTOMATON MODELS;
CONFIDENTIALITY;
COVERT CHANNELS;
HIDDEN INFORMATION FLOWS;
INFORMATION LEAK OUT;
SECURE OPERATING SYSTEMS;
ALGORITHMS;
COMMUNICATION CHANNELS (INFORMATION THEORY);
DATA FLOW ANALYSIS;
FINITE AUTOMATA;
MATHEMATICAL MODELS;
NETWORK PROTOCOLS;
SECURITY OF DATA;
SECURITY SYSTEMS;
COMPUTER OPERATING SYSTEMS;
|
EID: 33749458217
PISSN: 02544164
EISSN: None
Source Type: Journal
DOI: None Document Type: Article |
Times cited : (10)
|
References (13)
|