메뉴 건너뛰기




Volumn 29, Issue 8, 2006, Pages 1460-1467

State-based approach to information flow analysis

Author keywords

Confidentiality; Covert channel; Finite automata; Hidden information flow; Secure operating system

Indexed keywords

ACTION RULES; AUTOMATON MODELS; CONFIDENTIALITY; COVERT CHANNELS; HIDDEN INFORMATION FLOWS; INFORMATION LEAK OUT; SECURE OPERATING SYSTEMS;

EID: 33749458217     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (13)
  • 2
    • 84948947266 scopus 로고    scopus 로고
    • A practical approach to identifying storage and timing channels: Twenty years later
    • Nevada, USA
    • Richard A. K.. A practical approach to identifying storage and timing channels: Twenty years later. In: Proceedings of the Annual Computer Security Applications Conference, Nevada, USA, 2002, 109-18.
    • (2002) Proceedings of the Annual Computer Security Applications Conference , pp. 109-18
    • Richard, A.K.1
  • 3
    • 33749488396 scopus 로고    scopus 로고
    • The study of covert channels identification techniques
    • Chinese source
    • Zhu Hong, Feng Yu-Cai. The study of covert channels identification techniques. Computer Science, 2000, 27(5): 100-103 (in Chinese).
    • (2000) Computer Science , vol.27 , Issue.5 , pp. 100-103
    • Zhu, H.1    Feng, Y.-C.2
  • 6
    • 33749496386 scopus 로고    scopus 로고
    • A theorem proving approach to analysis of secure information flow
    • Warsaw, Poland
    • Adam D.. A theorem proving approach to analysis of secure information flow. In: Proceedings of the Workshop on Issues in the Theory of Security, Warsaw, Poland, 2003, 193-209.
    • (2003) Proceedings of the Workshop on Issues in the Theory of Security , pp. 193-209
    • Adam, D.1
  • 7
    • 0141528662 scopus 로고    scopus 로고
    • A unifying approach to the security of distributed and multi-threaded programs
    • Heiko M., Andrei S.. A unifying approach to the security of distributed and multi-threaded programs. Journal of Computer Security, 2003, 11(4). 615-676.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 615-676
    • Heiko, M.1    Andrei, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.