메뉴 건너뛰기




Volumn 29, Issue 8, 2008, Pages 46-56

Covert channel mitigation method for secure real-time database using capacity metric

Author keywords

Channel's capacity; Data conflict covert channel; Protocol selection policy; Secure real time database

Indexed keywords

CHANNEL'S CAPACITY; COVERT CHANNELS; DATA CONFLICT COVERT CHANNEL; PROTOCOL SELECTION POLICY; SECURE REAL-TIME DATABASE;

EID: 51649119359     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (23)
  • 2
    • 0027848097 scopus 로고
    • Database concurrency control in multilevel secure database management systems
    • Keefe T F, Tsai W T. Database concurrency control in multilevel secure database management systems [J]. IEEE Transactions on Knowledge and Data Engineering, 1993, 5(6): 1039-1055.
    • (1993) IEEE Transactions on Knowledge and Data Engineering , vol.5 , Issue.6 , pp. 1039-1055
    • Keefe, T.F.1    Tsai, W.T.2
  • 5
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson B W. A note on the confinement problem [J]. Communications of the ACM, 1973, 16(10): 613-615.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 6
    • 8644251330 scopus 로고    scopus 로고
    • Covet channel analysis on ANSHENG secure operating system
    • Qing S H, Zhu J F. Covet channel analysis on ANSHENG secure operating system[J]. Journal of Software, 2004, 15(9): 1385-1392.
    • (2004) Journal of Software , vol.15 , Issue.9 , pp. 1385-1392
    • Qing, S.H.1    Zhu, J.F.2
  • 9
    • 84886582404 scopus 로고    scopus 로고
    • Optimistic secure real-time concurrency control using multiple data version
    • Jeong B, et al. Optimistic secure real-time concurrency control using multiple data version [A]. Proc of LCTES 2000 [C]. 2001. 33-47.
    • (2001) Proc of LCTES 2000 , pp. 33-47
    • Jeong, B.1
  • 12
    • 0036494997 scopus 로고    scopus 로고
    • Maintaining security and timeliness in real-time database system
    • Ahmed Q N, Vrbsky S V. Maintaining security and timeliness in real-time database system [J]. Journal of Systems and Software, 2002, 61(1): 15-29.
    • (2002) Journal of Systems and Software , vol.61 , Issue.1 , pp. 15-29
    • Ahmed, Q.N.1    Vrbsky, S.V.2
  • 13
    • 0006313369 scopus 로고    scopus 로고
    • Improving timeliness in real-time secure database systems
    • Son S H, David R, Thuraisingham B. Improving timeliness in real-time secure database systems [J]. ACM SIGMOD Record, 1996, 25(1): 29-33.
    • (1996) ACM SIGMOD Record , vol.25 , Issue.1 , pp. 29-33
    • Son, S.H.1    David, R.2    Thuraisingham, B.3
  • 15
    • 51649118277 scopus 로고
    • National Computer Security Center. A guide to understanding covert channel analysis
    • National Computer Security Center. A guide to understanding covert channel analysis [A]. NCSC-TG-003 [C]. 1993.
    • (1993) NCSC-TG-003
  • 18
    • 33845924790 scopus 로고    scopus 로고
    • Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems
    • Joon S, J Alves-Foss. Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems [A]. Proc of the 2006 IEEE Workshop on Information Assurance [C]. 2006. 361-368.
    • (2006) Proc of the 2006 IEEE Workshop on Information Assurance , pp. 361-368
    • Joon, S.1    Alves-Foss, J.2
  • 20
    • 51649113353 scopus 로고    scopus 로고
    • Study on covert Channel Analysis in High-Level Secure Operating System
    • Graduate School of Chinese Academy of Sciences
    • Zhu J F. Study on covert Channel Analysis in High-Level Secure Operating System [D]. Graduate School of Chinese Academy of Sciences, 2005.
    • (2005)
    • Zhu, J.F.1
  • 22
    • 4043111268 scopus 로고    scopus 로고
    • On the schedulability test of rate monotonic (RM) and its extendible algorithms
    • Wang Y J, Chen Q P. On the schedulability test of rate monotonic (RM) and its extendible algorithms [J]. Journal of Software, 2004, 15(6): 799-814.
    • (2004) Journal of Software , vol.15 , Issue.6 , pp. 799-814
    • Wang, Y.J.1    Chen, Q.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.