-
1
-
-
0034313810
-
Integrating security and real-time requirements using covert channel capacity
-
Son S H, Mukkamala R, David R. Integrating security and real-time requirements using covert channel capacity [J]. IEEE Transactions on Knowledge and Data Engineering, 2000, 12(6): 865-879.
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 865-879
-
-
Son, S.H.1
Mukkamala, R.2
David, R.3
-
2
-
-
0027848097
-
Database concurrency control in multilevel secure database management systems
-
Keefe T F, Tsai W T. Database concurrency control in multilevel secure database management systems [J]. IEEE Transactions on Knowledge and Data Engineering, 1993, 5(6): 1039-1055.
-
(1993)
IEEE Transactions on Knowledge and Data Engineering
, vol.5
, Issue.6
, pp. 1039-1055
-
-
Keefe, T.F.1
Tsai, W.T.2
-
5
-
-
0015672289
-
A note on the confinement problem
-
Lampson B W. A note on the confinement problem [J]. Communications of the ACM, 1973, 16(10): 613-615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
6
-
-
8644251330
-
Covet channel analysis on ANSHENG secure operating system
-
Qing S H, Zhu J F. Covet channel analysis on ANSHENG secure operating system[J]. Journal of Software, 2004, 15(9): 1385-1392.
-
(2004)
Journal of Software
, vol.15
, Issue.9
, pp. 1385-1392
-
-
Qing, S.H.1
Zhu, J.F.2
-
9
-
-
84886582404
-
Optimistic secure real-time concurrency control using multiple data version
-
Jeong B, et al. Optimistic secure real-time concurrency control using multiple data version [A]. Proc of LCTES 2000 [C]. 2001. 33-47.
-
(2001)
Proc of LCTES 2000
, pp. 33-47
-
-
Jeong, B.1
-
10
-
-
84995455083
-
A nested transaction model for multilevel secure database management systems
-
Bertino E, Catania B, Ferrari E. A nested transaction model for multilevel secure database management systems [J]. ACM Transactions on Information and System Security, 2001, 4(4): 321-371.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.4
, pp. 321-371
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
-
12
-
-
0036494997
-
Maintaining security and timeliness in real-time database system
-
Ahmed Q N, Vrbsky S V. Maintaining security and timeliness in real-time database system [J]. Journal of Systems and Software, 2002, 61(1): 15-29.
-
(2002)
Journal of Systems and Software
, vol.61
, Issue.1
, pp. 15-29
-
-
Ahmed, Q.N.1
Vrbsky, S.V.2
-
13
-
-
0006313369
-
Improving timeliness in real-time secure database systems
-
Son S H, David R, Thuraisingham B. Improving timeliness in real-time secure database systems [J]. ACM SIGMOD Record, 1996, 25(1): 29-33.
-
(1996)
ACM SIGMOD Record
, vol.25
, Issue.1
, pp. 29-33
-
-
Son, S.H.1
David, R.2
Thuraisingham, B.3
-
15
-
-
51649118277
-
National Computer Security Center. A guide to understanding covert channel analysis
-
National Computer Security Center. A guide to understanding covert channel analysis [A]. NCSC-TG-003 [C]. 1993.
-
(1993)
NCSC-TG-003
-
-
-
18
-
-
33845924790
-
Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems
-
Joon S, J Alves-Foss. Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems [A]. Proc of the 2006 IEEE Workshop on Information Assurance [C]. 2006. 361-368.
-
(2006)
Proc of the 2006 IEEE Workshop on Information Assurance
, pp. 361-368
-
-
Joon, S.1
Alves-Foss, J.2
-
20
-
-
51649113353
-
Study on covert Channel Analysis in High-Level Secure Operating System
-
Graduate School of Chinese Academy of Sciences
-
Zhu J F. Study on covert Channel Analysis in High-Level Secure Operating System [D]. Graduate School of Chinese Academy of Sciences, 2005.
-
(2005)
-
-
Zhu, J.F.1
-
22
-
-
4043111268
-
On the schedulability test of rate monotonic (RM) and its extendible algorithms
-
Wang Y J, Chen Q P. On the schedulability test of rate monotonic (RM) and its extendible algorithms [J]. Journal of Software, 2004, 15(6): 799-814.
-
(2004)
Journal of Software
, vol.15
, Issue.6
, pp. 799-814
-
-
Wang, Y.J.1
Chen, Q.P.2
|