-
1
-
-
0003969633
-
Trusted computer system evaluation criteria
-
U.S. Department of Defense. DoD 5200.28-STD
-
U.S. Department of Defense. Trusted computer system evaluation criteria. DoD 5200.28-STD, 1985.
-
(1985)
-
-
-
2
-
-
77957969551
-
Classified oriteria for security protection of computer information system
-
GB 17859-1999, in Chinese
-
GB 17859-1999. Classified oriteria for security protection of computer information system. 2001 (in Chinese).
-
(2001)
-
-
-
3
-
-
0011326587
-
Information technology-security techniques-evaluation criteria for IT security
-
ISO/IEC 15408
-
ISO/IEC 15408. Information technology-security techniques-evaluation criteria for IT security. 1999.
-
(1999)
-
-
-
4
-
-
0015672289
-
A note on the confinement problem
-
Lampson BW. A note on the confinement problem. Communications of the ACM, 1973, 16(10): 613-615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
5
-
-
84945721946
-
A comment on the confinement problem
-
doi:10.1145/1067629.806537
-
Lipner SB. A comment on the confinement problem. Operating Systems Review, 1975, 9(5): 192-196. [doi:10.1145/1067629.806537]
-
(1975)
Operating Systems Review
, vol.9
, Issue.5
, pp. 192-196
-
-
Lipner, S.B.1
-
6
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
Simmons GJ. The prisoners' problem and the subliminal channel. In: Proc. of the CRYPTO'83-Advances in Cryptology. 1984. 51-67. http://www.cs.nccu.edu.tw/~raylin/ ⋯/Spring2009/ThePrisonerProblem.pdf
-
(1984)
Proc. of the CRYPTO'83-Advances in Cryptology
, pp. 51-67
-
-
Simmons, G.J.1
-
7
-
-
0010512569
-
A guide to understanding covert channel analysis of trusted systems
-
National Computer Security Center, NCSC-TG-30
-
National Computer Security Center. A guide to understanding covert channel analysis of trusted systems. NCSC-TG-30, 1993.
-
(1993)
-
-
-
9
-
-
12344282545
-
Secure computer systems: Mathematical foundations
-
Hanscom AFB, Bedford, FSD-TR-73-278, ESD/AFSC
-
Bell DE, Lapadula LJ. Secure computer systems: Mathematical foundations. Vol.1: Hanscom AFB, Bedford, FSD-TR-73-278, ESD/AFSC, 1973. 1-33.
-
(1973)
, vol.1
, pp. 1-33
-
-
Bell, D.E.1
Lapadula, L.J.2
-
10
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
doi: 10.1145/357369.357374
-
Kemmerer RA. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. on Computer System, 1983, 1(3): 256-277. [doi: 10.1145/357369.357374]
-
(1983)
ACM Trans. on Computer System
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
11
-
-
67649823284
-
A formal framework for real-time information flow analysis
-
Joon S, Jim AF. A formal framework for real-time information flow analysis. Computers and Security, 2009, 28(6): 421-432.
-
(2009)
Computers and Security
, vol.28
, Issue.6
, pp. 421-432
-
-
Joon, S.1
Jim, A.F.2
-
12
-
-
77957968081
-
Research on covert channel analysis and related techniques in secure database system
-
Ph.D. Thesis. Harbin: Harbin Engineering University, in Chinese
-
Cui BG. Research on covert channel analysis and related techniques in secure database system [Ph.D. Thesis]. Harbin: Harbin Engineering University, 2006 (in Chinese with English abstract).
-
(2006)
-
-
Cui, B.G.1
-
13
-
-
0024122416
-
Implications of multilevel systems on the data dictionary of a secure relational DBMS
-
Jensen NR. Implications of multilevel systems on the data dictionary of a secure relational DBMS. In: Proc. of the 4th Aerospace Computer Security Applications Conf. 1988. 58-65. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=113418
-
(1988)
Proc. of the 4th Aerospace Computer Security Applications Conf
, pp. 58-65
-
-
Jensen, N.R.1
-
14
-
-
27244432044
-
A generic audit policy model on multilevel secure DBMS
-
in Chinese, doi: 10.1360/jos161774
-
He YZ, Li L, Feng DG. A generic audit policy model on multilevel secure DBMS. Journal of Software, 2005, 16(10): 1774-1783 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/16/1774.htm [doi: 10.1360/jos161774]
-
(2005)
Journal of Software
, vol.16
, Issue.10
, pp. 1774-1783
-
-
He, Y.Z.1
Li, L.2
Feng, D.G.3
-
15
-
-
0034313810
-
Integrating security and real-time requirements using covert channel capacity
-
doi: 10.1109/69.895799
-
Son SH, Mukkamala R, David R. Integrating security and real-time requirements using covert channel capacity. IEEE Trans. on Knowledge and Data Engineering, 2000, 12(6): 865-879. [doi: 10.1109/69.895799]
-
(2000)
IEEE Trans. on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 865-879
-
-
Son, S.H.1
Mukkamala, R.2
David, R.3
-
16
-
-
0027848097
-
Database concurrency control in multilevel secure database management systems
-
doi: 10.1109/69.250090
-
Keefe TF, Tsai WT, Srivastava J. Database concurrency control in multilevel secure database management systems. IEEE Trans. on Knowledge and Data Engineering, 1993, 5(6): 1039-1055. [doi: 10.1109/69.250090]
-
(1993)
IEEE Trans. on Knowledge and Data Engineering
, vol.5
, Issue.6
, pp. 1039-1055
-
-
Keefe, T.F.1
Tsai, W.T.2
Srivastava, J.3
-
17
-
-
77957942263
-
Study on subliminal channels
-
Ph.D. Thesis. Xi'an: Xidian University, in Chinese
-
Dong QK. Study on subliminal channels [Ph.D. Thesis]. Xi'an: Xidian University, 2003 (in Chinese with English abstract).
-
(2003)
-
-
Dong, Q.K.1
-
18
-
-
77957964823
-
Study on covert channel analyhsis in high-level secure operating system
-
Ph.D. Thesis. Beijing: Graduate School, the Chinese Academy of Sciences, in Chinese
-
Zhu JF. Study on covert channel analyhsis in high-level secure operating system [Ph.D. Thesis]. Beijing: Graduate School, the Chinese Academy of Sciences, 2006 (in Chinese with English abstract).
-
(2006)
-
-
Zhu, J.F.1
-
19
-
-
0023294988
-
Covert channels in LAN's
-
doi: 10.1109/TSE.1987.233153
-
Girling CG. Covert channels in LAN's. IEEE Trans. on Software Engineering, 1987, SE-13(2): 292-296. [doi: 10.1109/TSE.1987.233153]
-
(1987)
IEEE Trans. on Software Engineering
, vol.SE-13
, Issue.2
, pp. 292-296
-
-
Girling, C.G.1
-
22
-
-
56549128365
-
Model-Based covert timing channels: Automated modeling and evasion
-
doi: 10.1007/978-3-540-87403-4_12
-
Gianvecchio S, Wang H, Wijesekera D, Jajodia S. Model-Based covert timing channels: Automated modeling and evasion. Recent Advances in Intrusion Detection, 2008, 5230: 211-230. [doi: 10.1007/978-3-540-87403-4_12]
-
(2008)
Recent Advances in Intrusion Detection
, vol.5230
, pp. 211-230
-
-
Gianvecchio, S.1
Wang, H.2
Wijesekera, D.3
Jajodia, S.4
-
24
-
-
79958234122
-
Covert channels and countermeasures in computer network protocols
-
doi: 10.1109/MCOM.2007.4395378
-
Zander S, Armitage G, Branch P. Covert channels and countermeasures in computer network protocols. IEEE Communications Magazine, 2007, 45(12): 136-142. [doi: 10.1109/MCOM.2007.4395378]
-
(2007)
IEEE Communications Magazine
, vol.45
, Issue.12
, pp. 136-142
-
-
Zander, S.1
Armitage, G.2
Branch, P.3
-
26
-
-
34249985742
-
An algorithm of webpage information hiding based on equal tag
-
in Chinese
-
Sun XM, Huang HJ, Wang BW, Sun G, Huang JW. An algorithm of webpage information hiding based on equal tag. Journal of Computer Research and Development, 2007, 44(5): 756-760 (in Chinese with English abstract).
-
(2007)
Journal of Computer Research and Development
, vol.44
, Issue.5
, pp. 756-760
-
-
Sun, X.M.1
Huang, H.J.2
Wang, B.W.3
Sun, G.4
Huang, J.W.5
-
28
-
-
38049087058
-
Detection of covert channel encoding in network packet delays
-
Technical Report, TR2005536, Department of Computer Science, Dartmouth College
-
Berk V, Giani A, Cybenko G. Detection of covert channel encoding in network packet delays. Technical Report, TR2005536, Department of Computer Science, Dartmouth College, 2005. 1-11.
-
(2005)
, pp. 1-11
-
-
Berk, V.1
Giani, A.2
Cybenko, G.3
-
30
-
-
0027208502
-
Detection and elimination of inference channels in multilevel relational database systems
-
Oakland
-
Qian XL, Stickel ME, Karp PD, Lunt TF, Garvey TD. Detection and elimination of inference channels in multilevel relational database systems. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland, 1993. 196-205. http://www.computer.org/portal/ web/csdl/doi/10.1109/RISP.1993.287632
-
(1993)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 196-205
-
-
Qian, X.L.1
Stickel, M.E.2
Karp, P.D.3
Lunt, T.F.4
Garvey, T.D.5
-
31
-
-
0032641890
-
20 years of covert channel modeling and analysis
-
Oakland
-
Millen J. 20 years of covert channel modeling and analysis. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland, 1999. 113-114. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=766906
-
(1999)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 113-114
-
-
Millen, J.1
-
32
-
-
0016949746
-
A lattice model of secure information flow
-
doi: 10.1145/ 360051.360056
-
Denning DE. A lattice model of secure information flow. Communications of the ACM, 1976, 19(5): 236-243. [doi: 10.1145/ 360051.360056]
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
35
-
-
0028064126
-
Eliminating formal flows in automated information flow analysis
-
Eckmann ST. Eliminating formal flows in automated information flow analysis. In: Proc. of the IEEE Symp. on Security and Privacy. 1994. 30-38. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=296594
-
(1994)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 30-38
-
-
Eckmann, S.T.1
-
36
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano D, Smith G, Irvine C. A sound type system for secure flow analysis. Journal of Computer Security, 1996, 4(2): 167-187.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
38
-
-
0023292228
-
An experience using two covert channel analysis techniques on a real system design
-
doi: 10.1109/TSE.1987.226479
-
Haigh JT, Kemmerer RA, Mchugh J, Young WD. An experience using two covert channel analysis techniques on a real system design. IEEE Trans. on Software Engineering, 1987, 13(2): 157-168. [doi: 10.1109/TSE.1987.226479]
-
(1987)
IEEE Trans. on Software Engineering
, vol.13
, Issue.2
, pp. 157-168
-
-
Haigh, J.T.1
Kemmerer, R.A.2
Mchugh, J.3
Young, W.D.4
-
39
-
-
8644270771
-
Covert channel analysis: A chapter of the handbook for the computer security certification of trusted systems
-
Department of Computer Science, Portland State University
-
Mchugh J. Covert channel analysis: A chapter of the handbook for the computer security certification of trusted systems. Department of Computer Science, Portland State University, 1996. 1-78. http://chacsnrlnavymil/publications/handbook
-
(1996)
, pp. 1-78
-
-
Mchugh, J.1
-
40
-
-
0026260664
-
Covert flow trees: A visual approach to analyzing covert storage channels
-
doi: 10.1109/32.106972
-
Kemmerer RA, Porras PA. Covert flow trees: A visual approach to analyzing covert storage channels. IEEE Trans. on Software Engineering, 1991, 17(11): 1166-1185. [doi: 10.1109/32.106972]
-
(1991)
IEEE Trans. on Software Engineering
, vol.17
, Issue.11
, pp. 1166-1185
-
-
Kemmerer, R.A.1
Porras, P.A.2
-
41
-
-
33646822696
-
Covert channel analysis in secure computer systems
-
Ph.D. Thesis. Maryland: University of Maryland-College Park (MD)
-
Tsai CR. Covert channel analysis in secure computer systems [Ph.D. Thesis]. Maryland: University of Maryland-College Park (MD), 1987.
-
(1987)
-
-
Tsai, C.R.1
-
42
-
-
0025438147
-
On the identification of covert storage channels in secure systems
-
doi: 10.1109/32.55086
-
Tsai CR, Gligor VD, Chandersekaran CS. On the identification of covert storage channels in secure systems. IEEE Trans. on Software Engineering, 1990, 16(6): 569-580. [doi: 10.1109/32.55086]
-
(1990)
IEEE Trans. on Software Engineering
, vol.16
, Issue.6
, pp. 569-580
-
-
Tsai, C.R.1
Gligor, V.D.2
Chandersekaran, C.S.3
-
43
-
-
77957937935
-
Research on information flow technologies and security architecture of secure operating system
-
Ph.D. Thesis. Beijing: Graduate University, the Chinese Academy of Sciences, in Chinese
-
Shen JJ. Research on information flow technologies and security architecture of secure operating system [Ph.D. Thesis]. Beijing: Graduate University, the Chinese Academy of Sciences, 2008 (in Chinese with English abstract).
-
(2008)
-
-
Shen, J.J.1
-
44
-
-
0023855640
-
A bandwidth computation model for covert storage channels and its applications
-
Tsai CR, Gligor VD. A bandwidth computation model for covert storage channels and its applications. In: Proc. of the IEEE Symp. on Security and Privacy. 1988. 108-121. http://www.computer.org/portal/web/csdl/doi/10.1109/SECPRI.1988.8103
-
(1988)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 108-121
-
-
Tsai, C.R.1
Gligor, V.D.2
-
46
-
-
14844349298
-
Bounds on the capacity of the unidirectional channels
-
doi: 10.1109/TC.2005.18
-
Tallini LG. Bounds on the capacity of the unidirectional channels. IEEE Trans. on Computers, 2005, 54(2): 232-235. [doi: 10.1109/TC.2005.18]
-
(2005)
IEEE Trans. on Computers
, vol.54
, Issue.2
, pp. 232-235
-
-
Tallini, L.G.1
-
47
-
-
33746635151
-
Bounds on mutual information rates of noisy channels with timing errors
-
Zeng W, Tokas J, Motwani R, Motwani R, Kavcic A. Bounds on mutual information rates of noisy channels with timing errors. In: Proc. of the Int'l Symp. on Information Theory. 2005. 709-713. http://www-ee.eng.hawaii.edu/~alek/Archive/2005/isit05.pdf
-
(2005)
Proc. of the Int'l Symp. on Information Theory
, pp. 709-713
-
-
Zeng, W.1
Tokas, J.2
Motwani, R.3
Motwani, R.4
Kavcic, A.5
-
48
-
-
0028566761
-
Covert channels-Here to stay
-
Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security
-
Moskowitz IS, Kang MH. Covert channels-Here to stay? In: Proc. of the 9th Annual Conf. on Computer Assurance (COMPASS 1994) 'Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security'. 1994. 235-243. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=318449
-
(1994)
Proc. of the 9th Annual Conf. on Computer Assurance (COMPASS 1994)
, pp. 235-243
-
-
Moskowitz, I.S.1
Kang, M.H.2
-
49
-
-
65349144517
-
New definition of small message criterion and its application in transaction covert channel mitigating
-
in Chinese, doi: 10.3724/SP.J.1001.2009.03246
-
Zeng HT, Wang YJ, Zu W, Cai JY, Ruan L. New definition of small message criterion and its application in transaction covert channel mitigating. Journal of Software, 2009, 20(4): 985-996 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3246.htm [doi: 10.3724/SP.J.1001.2009.03246]
-
(2009)
Journal of Software
, vol.20
, Issue.4
, pp. 985-996
-
-
Zeng, H.T.1
Wang, Y.J.2
Zu, W.3
Cai, J.Y.4
Ruan, L.5
-
50
-
-
0036494997
-
Maintaining security and timeliness in real-time database system
-
doi: 10.1016/S0164-1212(01)00111-X
-
Ahmed QN, Vrbsky SV. Maintaining security and timeliness in real-time database system. Journal of Systems and Software, 2002, 61(1): 15-29. [doi: 10.1016/S0164-1212(01)00111-X]
-
(2002)
Journal of Systems and Software
, vol.61
, Issue.1
, pp. 15-29
-
-
Ahmed, Q.N.1
Vrbsky, S.V.2
-
51
-
-
33845924790
-
Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems
-
Joon S, Jim AF. Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems. In: Proc. of the IEEE Workshop on Information Assurance United States Military Academy. 2006. 361-368. http://ieeexplore.ieee.org/xpl/ freeabs_all.jsp?arnumber=1652117
-
(2006)
Proc. of the IEEE Workshop on Information Assurance United States Military Academy
, pp. 361-368
-
-
Joon, S.1
Jim, A.F.2
-
53
-
-
0027307382
-
On introducing noise into the bus-contention channel
-
Oakland
-
Gray JW. On introducing noise into the bus-contention channel. In: Proc. of the IEEE Symp. on Security and Privacy. Oakland, 1993. 90-98. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=287640
-
(1993)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 90-98
-
-
Gray, J.W.1
-
55
-
-
12844265899
-
Covert channel analysis in secure operating systems with high security levels
-
in Chinese
-
Qing SH. Covert channel analysis in secure operating systems with high security levels. Journal of Software, 2004, 15(12): 1837-1849 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/15/1837.htm
-
(2004)
Journal of Software
, vol.15
, Issue.12
, pp. 1837-1849
-
-
Qing, S.H.1
-
56
-
-
0025641510
-
Information-Flow analysis for covert-channel identification in multilevel secure operating systems
-
He JS, Gligor VD. Information-Flow analysis for covert-channel identification in multilevel secure operating systems. In: Proc. of the Computer Security Foundations Workshop III. 1990. 139-148. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=128194
-
(1990)
Proc. of the Computer Security Foundations Workshop III
, pp. 139-148
-
-
He, J.S.1
Gligor, V.D.2
-
57
-
-
33749458217
-
A state-based approach to information flow analysis
-
in Chinese
-
Zi XC, Yao LH, Li L. A state-based approach to information flow analysis. Chinese Journal of Computers, 2006, 29(8): 1460-1467 (in Chinese with English abstract).
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.8
, pp. 1460-1467
-
-
Zi, X.C.1
Yao, L.H.2
Li, L.3
-
58
-
-
8644251330
-
Covet channel analysis on ANSHENG secure operating system
-
in Chinese
-
Qing SH, Zhu JF. Covet channel analysis on ANSHENG secure operating system. Journal of Software, 2004, 15(9): 1385-1392 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/15/1385.htm
-
(2004)
Journal of Software
, vol.15
, Issue.9
, pp. 1385-1392
-
-
Qing, S.H.1
Zhu, J.F.2
-
60
-
-
0032714529
-
Estimating and measuring covert channel bandwidth in multilevel secure operating systems
-
Shieh SP. Estimating and measuring covert channel bandwidth in multilevel secure operating systems. Journal of Information Science and Engineering, 1999, 15(1): 91-106.
-
(1999)
Journal of Information Science and Engineering
, vol.15
, Issue.1
, pp. 91-106
-
-
Shieh, S.P.1
-
62
-
-
33747336635
-
The channel capacity of a certain noisy timing channel
-
doi: 10.1109/18.144712
-
Moskowitz IS, Miller AR. The channel capacity of a certain noisy timing channel. IEEE Trans. on Information Theory, 1992, 38(4): 1339-1344. [doi: 10.1109/18.144712]
-
(1992)
IEEE Trans. on Information Theory
, vol.38
, Issue.4
, pp. 1339-1344
-
-
Moskowitz, I.S.1
Miller, A.R.2
-
65
-
-
33645958853
-
New constructive approach to covert channel modeling and channel capacity estimation
-
Wang ZH, Lee RB. New constructive approach to covert channel modeling and channel capacity estimation. In: Proc. of the 8th Information Security Conf. 2005. 498-505. http://palms.ee.princeton.edu/PALMSopen/ISC05_w_cit.pdf
-
(2005)
Proc. of the 8th Information Security Conf
, pp. 498-505
-
-
Wang, Z.H.1
Lee, R.B.2
-
66
-
-
33846277792
-
Automatic covert channel analysis of a multilevel secure component
-
Lanotte R, Maggiolo-Schettini A, Tini S, Troina A, Tronci E. Automatic covert channel analysis of a multilevel secure component. In: Proc. of the Information and Communications Security. 2004. 249-261. http://www.springerlink.com/content/r8fkgckuew 0l9mgr/
-
(2004)
Proc. of the Information and Communications Security
, pp. 249-261
-
-
Lanotte, R.1
Maggiolo-Schettini, A.2
Tini, S.3
Troina, A.4
Tronci, E.5
-
68
-
-
4043111268
-
On schedulability test of rate monotonic and its extendible algorithms
-
in Chinese
-
Wang YJ, Chen QP. On schedulability test of rate monotonic and its extendible algorithms. Journal of Software, 2004, 15(6): 799-814 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/15/799.htm
-
(2004)
Journal of Software
, vol.15
, Issue.6
, pp. 799-814
-
-
Wang, Y.J.1
Chen, Q.P.2
-
69
-
-
77957960630
-
Research on covert channel measurement and handling in secure real-time database
-
Ph.D. Thesis. Beijing: Graduate University, the Chinese Academy of Sciences, in Chinese
-
Zeng HT. Research on covert channel measurement and handling in secure real-time database [Ph.D. Thesis]. Beijing: Graduate University, the Chinese Academy of Sciences, 2008 (in Chinese with English abstract).
-
(2008)
-
-
Zeng, H.T.1
-
71
-
-
0033878717
-
Secure concurrency control in firm real-time database systems
-
doi: 10.1023/A: 1008783216944
-
George B, Haritsa JR. Secure concurrency control in firm real-time database systems. Distributed and Parallel Databases, 2000, 8(1): 41-83. [doi: 10.1023/A: 1008783216944]
-
(2000)
Distributed and Parallel Databases
, vol.8
, Issue.1
, pp. 41-83
-
-
George, B.1
Haritsa, J.R.2
-
74
-
-
0000446356
-
A network pump
-
doi: 10.1109/32.502225
-
Kang MH, Moskowitz IS, Lee DC. A network pump. IEEE Trans. on Software Engineering, 1996, 22(5): 329-338. [doi: 10.1109/32.502225]
-
(1996)
IEEE Trans. on Software Engineering
, vol.22
, Issue.5
, pp. 329-338
-
-
Kang, M.H.1
Moskowitz, I.S.2
Lee, D.C.3
-
76
-
-
0006313369
-
Improving timeliness in real-time secure database systems
-
Son SH, David R, Thuraisingham B. Improving timeliness in real-time secure database systems. SIGMOD Record, 1996, 25(1): 29-33.
-
(1996)
SIGMOD Record
, vol.25
, Issue.1
, pp. 29-33
-
-
Son, S.H.1
David, R.2
Thuraisingham, B.3
-
77
-
-
51649119359
-
Covert channel mitigation method for secure real-time database using capacity metric
-
in Chinese
-
Zeng HT, Wang YJ, Ruan L, Zu W, Cai JY. Covert channel mitigation method for secure real-time database using capacity metric. Journal on Communications, 2008, 20(8): 46-56 (in Chinese with English abstract).
-
(2008)
Journal on Communications
, vol.20
, Issue.8
, pp. 46-56
-
-
Zeng, H.T.1
Wang, Y.J.2
Ruan, L.3
Zu, W.4
Cai, J.Y.5
-
78
-
-
44449169384
-
Integrated criteria for covert channel auditing
-
doi: 10.1631/jzus.A071510
-
Wang CD, Ju SG. Integrated criteria for covert channel auditing. Journal of Zhejiang University-Science A, 2008, 9(6): 737-743. [doi: 10.1631/jzus.A071510]
-
(2008)
Journal of Zhejiang University-Science A
, vol.9
, Issue.6
, pp. 737-743
-
-
Wang, C.D.1
Ju, S.G.2
-
79
-
-
2642534513
-
Practical data hiding in TCP/IP
-
Multimedia Security
-
Ahsan K, Kundur D. Practical data hiding in TCP/IP. In: Proc. of the ACM Wksp. Multimedia Security, 2002. 1-8.
-
(2002)
Proc. of the ACM Wksp
, pp. 1-8
-
-
Ahsan, K.1
Kundur, D.2
-
81
-
-
60349097643
-
Application layer covert channel analysis and detection
-
Edinburgh: Napier University
-
Kwecka Z. Application layer covert channel analysis and detection. Edinburgh: Napier University, 2006. http://www.buchananweb.co.uk/zk.pdf
-
(2006)
-
-
Kwecka, Z.1
-
84
-
-
77957969118
-
An exploit-specific monitor to prevent malicious communication channel
-
Technical Report, GIT-CERCS-04-28, Georgia Institute of Technology
-
Eraser SA. An exploit-specific monitor to prevent malicious communication channel. Technical Report, GIT-CERCS-04-28, Georgia Institute of Technology, 2004. 1-12.
-
(2004)
, pp. 1-12
-
-
Eraser, S.A.1
-
85
-
-
33746584368
-
Embedding covert channels into TCP/IP
-
Murdoch SJ, Lewis S. Embedding covert channels into TCP/IP. In: Proc. of the Information Hiding. 2005. 247-261. http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf
-
(2005)
Proc. of the Information Hiding
, pp. 247-261
-
-
Murdoch, S.J.1
Lewis, S.2
-
87
-
-
0142187791
-
A study on the covert channel detection of TCP/IP header using support vector machine
-
DOI:10.1007/978-3-540-39927-8_29
-
Sohn T, Seo JT, Moon J. A study on the covert channel detection of TCP/IP header using support vector machine. Information and Communications Security, 2003, 2836: 313-324. [DOI:10.1007/978-3-540-39927-8_29]
-
(2003)
Information and Communications Security
, vol.2836
, pp. 313-324
-
-
Sohn, T.1
Seo, J.T.2
Moon, J.3
-
88
-
-
77955414848
-
Covert channel forensics on the Internet: Issues, approaches, and experiences
-
Patel A, Shah M, Chandramouli R, Subbalakshmi KP. Covert channel forensics on the Internet: Issues, approaches, and experiences. Int'l Journal of Network Security, 2007, 5(1): 41-50.
-
(2007)
Int'l Journal of Network Security
, vol.5
, Issue.1
, pp. 41-50
-
-
Patel, A.1
Shah, M.2
Chandramouli, R.3
Subbalakshmi, K.P.4
-
89
-
-
0031611375
-
Measuring regularity by means of a corrected conditional entropy in sympathetic outflow
-
doi: 10.1007/s004220050 414
-
Porta A, Baselli G, Liberati D, Montano N, Cogliati C, Gnecchi-Ruscone T, Malliani A, Cerutti S. Measuring regularity by means of a corrected conditional entropy in sympathetic outflow. Biological Cybernetics, 1998, 78(1): 71-78. [doi: 10.1007/s004220050 414]
-
(1998)
Biological Cybernetics
, vol.78
, Issue.1
, pp. 71-78
-
-
Porta, A.1
Baselli, G.2
Liberati, D.3
Montano, N.4
Cogliati, C.5
Gnecchi-Ruscone, T.6
Malliani, A.7
Cerutti, S.8
-
91
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Ristenpart T, Tromer E, Shacham H, Savage S. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In: Proc. of the 16th ACM Conf. on Computer and Communications Security. 2009. 199-212. http://portal.acm.org/citation.cfm?id=1653662.1653687
-
(2009)
Proc. of the 16th ACM Conf. on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
93
-
-
76849086598
-
IP covert channel detection
-
doi: 10.1145/1513601.1513604
-
Cabuk S, Brodley CE, Shields C. IP covert channel detection. ACM Trans. on Information and System Security, 2009, 12(4): 1-29. [doi: 10.1145/1513601.1513604]
-
(2009)
ACM Trans. on Information and System Security
, vol.12
, Issue.4
, pp. 1-29
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
|