메뉴 건너뛰기




Volumn 4, Issue 4, 2010, Pages 233-247

Covert channel resistant information leakage protection using a multi-agent architecture

Author keywords

[No Author keywords available]

Indexed keywords

AGENT-BASED APPROACH; AGENT-BASED SYSTEMS; CORRECTNESS PROPERTIES; COVERT CHANNELS; FILESYSTEM; INFORMATION LEAKAGE; LOCAL NETWORKS; MULTIAGENT ARCHITECTURE; OPERATING SYSTEMS; SECURITY CLASSIFICATION; SECURITY LABEL; SECURITY POLICY; SENSITIVE INFORMATIONS; SHARED RESOURCES; WATERMARKING ALGORITHMS;

EID: 78650404228     PISSN: 17518709     EISSN: 17518717     Source Type: Journal    
DOI: 10.1049/iet-ifs.2009.0202     Document Type: Article
Times cited : (7)

References (32)
  • 1
    • 0010512569 scopus 로고
    • National Computer Security Center NCSC-TG-30, November accessed May 2009
    • National Computer Security Center: 'A guide to understanding covert channel analysis of trusted systems', NCSC-TG-30, November 1993, http://www.radium.ncsc.mil/tpep/library/rainbow, accessed May 2009
    • (1993) A Guide to Understanding Covert Channel Analysis of Trusted Systems
  • 3
    • 51349092896 scopus 로고    scopus 로고
    • Information leakage via electromagnetic emanation and effectiveness of averaging technique
    • April
    • Tanaka, H.: ' Information leakage via electromagnetic emanation and effectiveness of averaging technique ', Proc. Int. Conf. on Information Security and Assurance, April, 2008, p. 98-101
    • (2008) Proc. Int. Conf. on Information Security and Assurance , pp. 98-101
    • Tanaka, H.1
  • 4
  • 6
    • 65449181169 scopus 로고    scopus 로고
    • Preventing information leakage between collaborating organisations
    • Alawneh, M., and Abbadi, I.M.: ' Preventing information leakage between collaborating organisations ', Proc. Tenth Int. Conf. on Electronic Commerce, 2008, 342, p. 1-10
    • (2008) Proc. Tenth Int. Conf. on Electronic Commerce , vol.342 , pp. 1-10
    • Alawneh, M.1    Abbadi, I.M.2
  • 12
    • 79958234122 scopus 로고    scopus 로고
    • Covert channels and countermeasures in computer network protocols
    • 0163-6804
    • Zander, S., Armitage, G., and Branch, P.: ' Covert channels and countermeasures in computer network protocols ', IEEE Commun. Mag., 2007, 45, (12), p. 136-142 0163-6804
    • (2007) IEEE Commun. Mag. , vol.45 , Issue.12 , pp. 136-142
    • Zander, S.1    Armitage, G.2    Branch, P.3
  • 17
    • 0025438147 scopus 로고
    • On the identification of covert storage channels in secure systems
    • DOI 10.1109/32.55086
    • Tsai, C., Gligor, V., and Chandersekaran, C.: ' On the identification of covert storage channels in secure systems ', IEEE Trans. Softw. Eng., 1990, 16, (6), p. 569-580 0098-5589 (Pubitemid 20737559)
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.6 , pp. 569-580
    • Tsai, C.-R.1    Gligor, V.D.2    Chandersekaran, C.3
  • 18
    • 15944395411 scopus 로고    scopus 로고
    • Searching covert channels by identifying malicious subjects in the time domain
    • Wang, C., and Ju, S.: ' Searching covert channels by identifying malicious subjects in the time domain ', Proc. Fifth Annual IEEE SMC Information Assurance Workshop, 2004, p. 68-73
    • (2004) Proc. Fifth Annual IEEE SMC Information Assurance Workshop , pp. 68-73
    • Wang, C.1    Ju, S.2
  • 23
    • 70350538301 scopus 로고    scopus 로고
    • Verifiable distributed oblivious transfer and mobile agent security
    • 10.1007/s11036-005-4472-2 1383-469X
    • Zhong, S., and Yang, Y.R.: ' Verifiable distributed oblivious transfer and mobile agent security ', Mobile Netw. Appl., 2006, 11, (2), p. 201-210 10.1007/s11036-005-4472-2 1383-469X
    • (2006) Mobile Netw. Appl. , vol.11 , Issue.2 , pp. 201-210
    • Zhong, S.1    Yang, Y.R.2
  • 24
    • 58549113170 scopus 로고    scopus 로고
    • Evaluating the security of mobile agent platforms
    • 1387-2532
    • Burkle, A., Hertel, A., Mller, W., and Wieser, M.: ' Evaluating the security of mobile agent platforms ', Auton. Agents Multi-Agent Syst., 2008, 18, (2), p. 295-311 1387-2532
    • (2008) Auton. Agents Multi-Agent Syst. , vol.18 , Issue.2 , pp. 295-311
    • Burkle, A.1    Hertel, A.2    Mller, W.3    Wieser, M.4
  • 26
    • 1542413619 scopus 로고    scopus 로고
    • FIPA communicative Act Library Specification accessed May 2009
    • FIPA communicative Act Library Specification: 'Foundation for intelligent physical agents', 2000, http://www.fipa.org/specs/fipa00037/, accessed May 2009
    • (2000) Foundation for Intelligent Physical Agents
  • 27
    • 34547702412 scopus 로고    scopus 로고
    • Kernel korner: Intro to inotify
    • 1075-3583
    • Love, R.: ' Kernel korner: intro to inotify ', Linux J., 2005, p. 8 1075-3583
    • (2005) Linux J. , pp. 8
    • Love, R.1
  • 29
    • 84891467125 scopus 로고    scopus 로고
    • accessed May 2009
    • Meerwald, P.: 'Digital watermarking', http://www.cosy.sbg.ac.at/~pmeerw/ Watermarking/, accessed May 2009
    • Digital Watermarking
    • Meerwald, P.1
  • 31
    • 0005052707 scopus 로고
    • The Boyer-Moore theorem prover and its interactive enhancement
    • 0898-1221
    • Kaufmann, M., and Boyer, R.S.: ' The Boyer-Moore theorem prover and its interactive enhancement ', Comput. Math. Appl., 1995, 29, (2), p. 27-62 0898-1221
    • (1995) Comput. Math. Appl. , vol.29 , Issue.2 , pp. 27-62
    • Kaufmann, M.1    Boyer, R.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.