-
1
-
-
82755195334
-
NCSC
-
Trusted computer system evaluation criteria (orange book)
-
NCSC, Trusted computer system evaluation criteria (orange book) 1985.
-
(1985)
-
-
-
2
-
-
0015672289
-
A note on the confinement problem
-
Lampson B.W. A note on the confinement problem. Communications of the ACM 1973, 16(10):613-615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
4
-
-
84976219767
-
II, Hiding data in the OSI network model
-
in: Information Hiding
-
T.G. Handel, M.T. Sandford II, Hiding data in the OSI network model, in: Information Hiding, 1996, pp. 23-38.
-
(1996)
, pp. 23-38
-
-
Handel, T.G.1
Sandford, M.T.2
-
5
-
-
0012054514
-
Covert channels in the TCP/IP protocol suite
-
First Monday
-
C. Rowland, Covert channels in the TCP/IP protocol suite, First Monday, 2 (5-5).
-
, vol.2
, Issue.5
-
-
Rowland, C.1
-
7
-
-
71849083789
-
A study of on/off timing channel based on packet delay distribution
-
Yao L., Zi X., Pan L., Li J. A study of on/off timing channel based on packet delay distribution. Computers & Security 2009, 28(8):785-794. 10.1016/j.cose.2009.05.006.
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 785-794
-
-
Yao, L.1
Zi, X.2
Pan, L.3
Li, J.4
-
9
-
-
2642534513
-
Practical data hiding in TCP/IP
-
in: Proc. Workshop on Multimedia Security at ACM Multimedia, Citeseer
-
K. Ahsan, D. Kundur, Practical data hiding in TCP/IP, in: Proc. Workshop on Multimedia Security at ACM Multimedia, Citeseer, 2002.
-
(2002)
-
-
Ahsan, K.1
Kundur, D.2
-
11
-
-
38049087058
-
Detection of covert channel encoding in network packet delays
-
De lUniversité de Dartmouth. Novembre.
-
V. Berk, A. Giani, G. Cybenko, N. Hanover, Detection of covert channel encoding in network packet delays, Rapport Technique TR536, de lUniversité de Dartmouth. Novembre.
-
Rapport Technique TR536
-
-
Berk, V.1
Giani, A.2
Cybenko, G.3
Hanover, N.4
-
12
-
-
77952331178
-
Detecting covert timing channels: an entropy-based approach
-
ACM, New York, NY, USA
-
Gianvecchio S., Wang H. Detecting covert timing channels: an entropy-based approach. CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security 2007, 307-316. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1315245.1315284.
-
(2007)
CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 307-316
-
-
Gianvecchio, S.1
Wang, H.2
-
13
-
-
67649823284
-
A formal framework for real-time information flow analysis
-
Son J., Alves-Foss J. A formal framework for real-time information flow analysis. Computer Security 2009, 28(6):421-432. 10.1016/j.cose.2009.01.005.
-
(2009)
Computer Security
, vol.28
, Issue.6
, pp. 421-432
-
-
Son, J.1
Alves-Foss, J.2
-
14
-
-
70349682314
-
TCP/IP timing channels
-
in: INFOCOM
-
S.H. Sellke, C.-C. Wang, S. Bagchi, N.B. Shroff, TCP/IP timing channels: theory to implementation, in: INFOCOM, 2009, pp. 2204-2212.
-
(2009)
theory to implementation
, pp. 2204-2212
-
-
Sellke, S.H.1
Wang, C.-C.2
Bagchi, S.3
Shroff, N.B.4
-
16
-
-
65349144517
-
New definition of small message criterion and its application in transaction covert channel mitigating
-
Zeng H.-T., Wang Y.-J., Zu W., Cai J.-Y., Ruan L. New definition of small message criterion and its application in transaction covert channel mitigating. Journal of Software 2009, 20(4):985-996.
-
(2009)
Journal of Software
, vol.20
, Issue.4
, pp. 985-996
-
-
Zeng, H.-T.1
Wang, Y.-J.2
Zu, W.3
Cai, J.-Y.4
Ruan, L.5
-
17
-
-
70350213805
-
A method for the construction of minimum-redundancy codes
-
Huffman D. A method for the construction of minimum-redundancy codes. Resonance 2006, 11(2):91-99.
-
(2006)
Resonance
, vol.11
, Issue.2
, pp. 91-99
-
-
Huffman, D.1
-
18
-
-
80054714730
-
20 years of covert channel modeling and analysis
-
in: IEEE Symposium on Security and Privacy
-
J.K. Millen, 20 years of covert channel modeling and analysis, in: IEEE Symposium on Security and Privacy, 1999, pp. 113-114.
-
(1999)
, pp. 113-114
-
-
Millen, J.K.1
-
19
-
-
82755195333
-
Essays about computer security
-
Centre for Communications Systems Research Cambridge, c Cambridge
-
E. Lee, Essays about computer security, Centre for Communications Systems Research Cambridge, c Cambridge..
-
-
-
Lee, E.1
-
21
-
-
51649119359
-
Covert channel mitigation method. For secure real-time database using capacity metric
-
Zeng H.-T., Wang Y.-J., Ruan L., Zu W., Cai J.-Y. Covert channel mitigation method. For secure real-time database using capacity metric. Journal of Communications 2008, 29(8):46-56.
-
(2008)
Journal of Communications
, vol.29
, Issue.8
, pp. 46-56
-
-
Zeng, H.-T.1
Wang, Y.-J.2
Ruan, L.3
Zu, W.4
Cai, J.-Y.5
-
22
-
-
0036494997
-
Maintaining security and timeliness in real-time database system
-
Ahmed Q.N., Vrbsky S.V. Maintaining security and timeliness in real-time database system. Journal of Systems and Software 2002, 61(1):15-29. 10.1016/S0164-1212(01)00111-X.
-
(2002)
Journal of Systems and Software
, vol.61
, Issue.1
, pp. 15-29
-
-
Ahmed, Q.N.1
Vrbsky, S.V.2
-
23
-
-
0028566761
-
Covert channels-here to stay?
-
Fault Tolerance, Concurrency and Real Time, Security, Proceedings of the Ninth Annual Conference on, 1994
-
I. Moskowitz, M. Kang, Covert channels-here to stay?, in: Computer Assurance, 1994, COMPASS'94 Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security, Proceedings of the Ninth Annual Conference on, 1994, pp. 235-243. doi:10.1109/CMPASS.1994.318449.
-
(1994)
Computer Assurance, COMPASS'94 Safety, Reliability
, pp. 235-243
-
-
Moskowitz, I.1
Kang, M.2
-
24
-
-
82755194343
-
-
Foundations of covert-channel detection
-
J. Millen, Foundations of covert-channel detection (1989).
-
(1989)
-
-
Millen, J.1
-
25
-
-
0023855640
-
A bandwidth computation model for covert storage channels and its applications
-
Los Alamitos, CA, USA
-
C.-R. Tsai, V.D. Gligor, A bandwidth computation model for covert storage channels and its applications, in: IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 1988, pp. 108-121.
-
(1988)
in: IEEE Symposium on Security and Privacy
, pp. 108-121
-
-
Tsai, C.-R.1
Gligor, V.D.2
-
26
-
-
0036350162
-
Bounds on the capacity of deletion channels
-
in: Information Theory, Proceedings, 2002 IEEE International Symposium on, 2002
-
S. Diggavi, M. Grossglauser, Bounds on the capacity of deletion channels, in: Information Theory, 2002, Proceedings, 2002 IEEE International Symposium on, 2002, pp. 421-421. doi:10.1109/ISIT.2002.1023693.
-
(2002)
, pp. 421-421
-
-
Diggavi, S.1
Grossglauser, M.2
|