-
1
-
-
0015287895
-
An Algorithm for Computing the Capacity of Arbitrary Discrete Memoryless Channels
-
S. Arimoto. An Algorithm for Computing the Capacity of Arbitrary Discrete Memoryless Channels. IEEE Transactions on Information Theory, 18(1):14-20, 1972.
-
(1972)
IEEE Transactions on Information Theory
, vol.18
, Issue.1
, pp. 14-20
-
-
Arimoto, S.1
-
3
-
-
0015376113
-
Computation of Channel Capacity and Rate-Distortion Functions
-
R. Blahut. Computation of Channel Capacity and Rate-Distortion Functions. IEEE Transactions on Information Theory, 18(4):460-473, 1972.
-
(1972)
IEEE Transactions on Information Theory
, vol.18
, Issue.4
, pp. 460-473
-
-
Blahut, R.1
-
5
-
-
35048870986
-
-
Common Criteria for Information Technology Security Evaluation Version 2.3, 2005
-
Common Criteria for Information Technology Security Evaluation Version 2.3, 2005.
-
-
-
-
6
-
-
35048837014
-
-
Intel Corporation. Interrupt Moderation Using Intel Gigabit Ethernet Controllers, Application Note (AP-450), Revision 1.1,2003.
-
Intel Corporation. Interrupt Moderation Using Intel Gigabit Ethernet Controllers, Application Note (AP-450), Revision 1.1,2003.
-
-
-
-
8
-
-
0017517624
-
Certification of Programs for Secure Information Flow
-
D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
9
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
D. E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
10
-
-
0003562729
-
A Technique for Proving Specifications are Multilevel Secure
-
Technical Report CSL-109, Computer Science Laboratory, SRI International
-
R. Feiertag. A Technique for Proving Specifications are Multilevel Secure. Technical Report CSL-109, Computer Science Laboratory, SRI International, 1980.
-
(1980)
-
-
Feiertag, R.1
-
15
-
-
0023292228
-
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design
-
J. T. Haigh, R. A. Kemmerer, J. McHugh, and W. D. Young. An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Transactions on Software Engineering, 13(2):157-168, 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 157-168
-
-
Haigh, J.T.1
Kemmerer, R.A.2
McHugh, J.3
Young, W.D.4
-
18
-
-
11944266539
-
Information Theory and Statistical Mechanics
-
E. T. Jaynes. Information Theory and Statistical Mechanics. Physical Review, (106):620-630, 1957.
-
(1957)
Physical Review
, vol.106
, pp. 620-630
-
-
Jaynes, E.T.1
-
19
-
-
35048828743
-
-
S. M. Kay. Fundamentals of Statistical Signal Processing, I: Estimation Theory. Prentice Hall, 1993.
-
S. M. Kay. Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory. Prentice Hall, 1993.
-
-
-
-
20
-
-
84976667065
-
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
-
R. A. Kemmerer. Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Transactions on Computer Systems, 1(3):256-277, 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
21
-
-
84948947266
-
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
-
R. A. Kemmerer. A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. In 18th Annual Computer Security Applications Conference, pages 109-118, 2002.
-
(2002)
18th Annual Computer Security Applications Conference
, pp. 109-118
-
-
Kemmerer, R.A.1
-
22
-
-
0027719713
-
-
M. H. Kang and I. S. Moskowitz. A Pump for Rapid, Reliable, Secure Communication. In ACM Conference on Computer and Communications Security, pages 119-129, 1993.
-
M. H. Kang and I. S. Moskowitz. A Pump for Rapid, Reliable, Secure Communication. In ACM Conference on Computer and Communications Security, pages 119-129, 1993.
-
-
-
-
25
-
-
0025137215
-
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A VMM Security Kernel for the VAX Architecture. In IEEE Symposium on Security and Privacy, pages 2-19, 1990.
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A VMM Security Kernel for the VAX Architecture. In IEEE Symposium on Security and Privacy, pages 2-19, 1990.
-
-
-
-
26
-
-
0015672289
-
A Note on the Confinement Problem
-
B. W. Lampson. A Note on the Confinement Problem. Communications of the ACM, 16(10):613-615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
27
-
-
35048895703
-
-
Seagate Technology LLC. Product Manual Barracuda 7200.7 Serial ATA, 2005.
-
Seagate Technology LLC. Product Manual Barracuda 7200.7 Serial ATA, 2005.
-
-
-
-
29
-
-
8644270771
-
Covert Channel Analysis: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems
-
J. McHugh. Covert Channel Analysis: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems. NRL Technical Memorandum 5540:080A, 1995.
-
(1995)
NRL Technical Memorandum
, vol.5540
-
-
McHugh, J.1
-
31
-
-
0016951438
-
Security Kernel Validation in Practice
-
J. K. Millen. Security Kernel Validation in Practice. Communications of the ACM, 19(5):243-250, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 243-250
-
-
Millen, J.K.1
-
37
-
-
35048886450
-
Variable Noise Effects Upon a Simple Timing Channel
-
I. S. Moskowitz. Variable Noise Effects Upon a Simple Timing Channel. In IEEE Symposium on Security and Privacy, pages 362-372, 1991.
-
(1991)
IEEE Symposium on Security and Privacy
, pp. 362-372
-
-
Moskowitz, I.S.1
-
40
-
-
84958951541
-
Program Confinement in KVM/370
-
M. Schaefer, B. Gold, R. Linde, and J. Scheid. Program Confinement in KVM/370. In Proceedings of the ACM Annual Conference, pages 404-410, 1977.
-
(1977)
Proceedings of the ACM Annual Conference
, pp. 404-410
-
-
Schaefer, M.1
Gold, B.2
Linde, R.3
Scheid, J.4
-
41
-
-
84856043672
-
A Mathematical Theory of Communication
-
and
-
C. Shannon. A Mathematical Theory of Communication. Bell System Technical Journal, 27:379-423 and 623-656, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
-
-
Shannon, C.1
-
44
-
-
35048881887
-
-
Department of Defense Trusted Computer System Evaluation Criteria (TCSEC), DOD 5200.28-STD, 1985.
-
Department of Defense Trusted Computer System Evaluation Criteria (TCSEC), DOD 5200.28-STD, 1985.
-
-
-
-
46
-
-
35048874114
-
-
The MathWorks. xPC Target Realtime Kernel http://www.mathworks.com/ access/helpdesk/help/toolbox/xpc/ug/ f5-15620.html, April 12th 2007.
-
The MathWorks. xPC Target Realtime Kernel http://www.mathworks.com/ access/helpdesk/help/toolbox/xpc/ug/ f5-15620.html, April 12th 2007.
-
-
-
-
48
-
-
0001905093
-
A Sound Type System for Secure Flow Analysis
-
D. Volpano, G. Smith, and C. Irvine. A Sound Type System for Secure Flow Analysis. Journal of Computer Security, 4(3): 1-21, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 1-21
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|