-
1
-
-
0010512569
-
-
National Computer Security Center NCSC-TG-30, November accessed May 2009
-
National Computer Security Center: 'A guide to understanding covert channel analysis of trusted systems', NCSC-TG-30, November 1993, http://www.radium.ncsc.mil/tpep/library/rainbow, accessed May 2009
-
(1993)
A Guide to Understanding Covert Channel Analysis of Trusted Systems
-
-
-
3
-
-
51349092896
-
Information leakage via electromagnetic emanation and effectiveness of averaging technique
-
April
-
Tanaka, H.: ' Information leakage via electromagnetic emanation and effectiveness of averaging technique ', Proc. Int. Conf. on Information Security and Assurance, April, 2008, p. 98-101
-
(2008)
Proc. Int. Conf. on Information Security and Assurance
, pp. 98-101
-
-
Tanaka, H.1
-
4
-
-
78650371884
-
-
Research report, Deloitte
-
'2006 Global Security Survey ', Research report, Deloitte, 2006
-
(2006)
2006 Global Security Survey
-
-
-
6
-
-
65449181169
-
Preventing information leakage between collaborating organisations
-
Alawneh, M., and Abbadi, I.M.: ' Preventing information leakage between collaborating organisations ', Proc. Tenth Int. Conf. on Electronic Commerce, 2008, 342, p. 1-10
-
(2008)
Proc. Tenth Int. Conf. on Electronic Commerce
, vol.342
, pp. 1-10
-
-
Alawneh, M.1
Abbadi, I.M.2
-
7
-
-
55849114919
-
Preventing insider information leakage for enterprises
-
Alawneh, M., and Abbadi, I.M.: ' Preventing insider information leakage for enterprises ', Proc. Second Int. Conf. on Emerging Security Information, Systems and Technologies, 2008, p. 99-106
-
(2008)
Proc. Second Int. Conf. on Emerging Security Information, Systems and Technologies
, pp. 99-106
-
-
Alawneh, M.1
Abbadi, I.M.2
-
9
-
-
24944456026
-
-
(Springer Berlin), (LNCS, 3483)
-
Chang, H., and Kim, K.: ' Design of inside information leakage prevention system in ubiquitous computing environment ', (Springer Berlin, 2005), (LNCS, 3483), p. 128-137
-
(2005)
Design of Inside Information Leakage Prevention System in Ubiquitous Computing Environment
, pp. 128-137
-
-
Chang, H.1
Kim, K.2
-
10
-
-
70350356195
-
-
PhD, Purdue University
-
Cabuk, S.: ' Network covert channels: design, analysis, detection, and elimination ', 2006, PhD, Purdue University
-
(2006)
Network covert channels: design, analysis, detection, and elimination
-
-
Cabuk, S.1
-
12
-
-
79958234122
-
Covert channels and countermeasures in computer network protocols
-
0163-6804
-
Zander, S., Armitage, G., and Branch, P.: ' Covert channels and countermeasures in computer network protocols ', IEEE Commun. Mag., 2007, 45, (12), p. 136-142 0163-6804
-
(2007)
IEEE Commun. Mag.
, vol.45
, Issue.12
, pp. 136-142
-
-
Zander, S.1
Armitage, G.2
Branch, P.3
-
13
-
-
16244364015
-
A typical noisy covert channel in the IP protocol
-
Qu, H., Su, P., and Feng, D.: ' A typical noisy covert channel in the IP protocol ', Proc. 38th Annual Int. Carnahan Conf. on Security Technology, 2004, p. 189-192
-
(2004)
Proc. 38th Annual Int. Carnahan Conf. on Security Technology
, pp. 189-192
-
-
Qu, H.1
Su, P.2
Feng, D.3
-
14
-
-
24944510112
-
A covert channel in MAC protocols based on splitting algorithms
-
Li, S., and Ephremides, A.: ' A covert channel in MAC protocols based on splitting algorithms ', Proc. IEEE Wireless Communications and Networking Conf., 2005, 2, p. 1168-1173
-
(2005)
Proc. IEEE Wireless Communications and Networking Conf.
, vol.2
, pp. 1168-1173
-
-
Li, S.1
Ephremides, A.2
-
15
-
-
14844330726
-
IP covert timing channels: Design and detection
-
Cabuk, S., Brodley, C., and Shields, C.: ' IP covert timing channels: design and detection ', Proc. 2004 ACM Conf. on Computer and Communications Security, 2004, p. 178-187
-
(2004)
Proc. 2004 ACM Conf. on Computer and Communications Security
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.2
Shields, C.3
-
17
-
-
0025438147
-
On the identification of covert storage channels in secure systems
-
DOI 10.1109/32.55086
-
Tsai, C., Gligor, V., and Chandersekaran, C.: ' On the identification of covert storage channels in secure systems ', IEEE Trans. Softw. Eng., 1990, 16, (6), p. 569-580 0098-5589 (Pubitemid 20737559)
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 569-580
-
-
Tsai, C.-R.1
Gligor, V.D.2
Chandersekaran, C.3
-
21
-
-
0000446356
-
A network pump
-
0098-5589
-
Kang, M.H., Moskowitz, I.S., and Lee, D.C.: ' A network pump ', IEEE Trans. Softw. Eng., 1996, 22, p. 329-338 0098-5589
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, pp. 329-338
-
-
Kang, M.H.1
Moskowitz, I.S.2
Lee, D.C.3
-
22
-
-
33846329830
-
The Pump: A decade of covert fun
-
Kang, M.H., Moskowitz, I.S., and Lee, D.C.: ' The Pump: a decade of covert fun ', Proc. 21st Annual Computer Security Applications Conf., 2005, p. 352-360
-
(2005)
Proc. 21st Annual Computer Security Applications Conf.
, pp. 352-360
-
-
Kang, M.H.1
Moskowitz, I.S.2
Lee, D.C.3
-
23
-
-
70350538301
-
Verifiable distributed oblivious transfer and mobile agent security
-
10.1007/s11036-005-4472-2 1383-469X
-
Zhong, S., and Yang, Y.R.: ' Verifiable distributed oblivious transfer and mobile agent security ', Mobile Netw. Appl., 2006, 11, (2), p. 201-210 10.1007/s11036-005-4472-2 1383-469X
-
(2006)
Mobile Netw. Appl.
, vol.11
, Issue.2
, pp. 201-210
-
-
Zhong, S.1
Yang, Y.R.2
-
24
-
-
58549113170
-
Evaluating the security of mobile agent platforms
-
1387-2532
-
Burkle, A., Hertel, A., Mller, W., and Wieser, M.: ' Evaluating the security of mobile agent platforms ', Auton. Agents Multi-Agent Syst., 2008, 18, (2), p. 295-311 1387-2532
-
(2008)
Auton. Agents Multi-Agent Syst.
, vol.18
, Issue.2
, pp. 295-311
-
-
Burkle, A.1
Hertel, A.2
Mller, W.3
Wieser, M.4
-
25
-
-
70449633731
-
Agent protection based on the use of cryptographic hardware
-
Munoz, A., Mana, A., Harjani, R., and Montenegro, M.: ' Agent protection based on the use of cryptographic hardware ', Proc. 2009 33rd Annual IEEE Int. Computer Software and Applications Conf., 2009, 2, p. 312-317
-
(2009)
Proc. 2009 33rd Annual IEEE Int. Computer Software and Applications Conf.
, vol.2
, pp. 312-317
-
-
Munoz, A.1
Mana, A.2
Harjani, R.3
Montenegro, M.4
-
26
-
-
1542413619
-
-
FIPA communicative Act Library Specification accessed May 2009
-
FIPA communicative Act Library Specification: 'Foundation for intelligent physical agents', 2000, http://www.fipa.org/specs/fipa00037/, accessed May 2009
-
(2000)
Foundation for Intelligent Physical Agents
-
-
-
27
-
-
34547702412
-
Kernel korner: Intro to inotify
-
1075-3583
-
Love, R.: ' Kernel korner: intro to inotify ', Linux J., 2005, p. 8 1075-3583
-
(2005)
Linux J.
, pp. 8
-
-
Love, R.1
-
28
-
-
0032292216
-
A New wavelet-based scheme for watermarking images
-
October
-
Dugad, R., Ratakonda, K., and Ahuja, N.: ' A New wavelet-based scheme for watermarking images ', Proc. Int. Conf. on Image Processing, October, 1998, 2, p. 419-423
-
(1998)
Proc. Int. Conf. on Image Processing
, vol.2
, pp. 419-423
-
-
Dugad, R.1
Ratakonda, K.2
Ahuja, N.3
-
29
-
-
84891467125
-
-
accessed May 2009
-
Meerwald, P.: 'Digital watermarking', http://www.cosy.sbg.ac.at/~pmeerw/ Watermarking/, accessed May 2009
-
Digital Watermarking
-
-
Meerwald, P.1
-
31
-
-
0005052707
-
The Boyer-Moore theorem prover and its interactive enhancement
-
0898-1221
-
Kaufmann, M., and Boyer, R.S.: ' The Boyer-Moore theorem prover and its interactive enhancement ', Comput. Math. Appl., 1995, 29, (2), p. 27-62 0898-1221
-
(1995)
Comput. Math. Appl.
, vol.29
, Issue.2
, pp. 27-62
-
-
Kaufmann, M.1
Boyer, R.S.2
|