메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 109-118

A practical approach to identifying storage and timing channels: Twenty years later

Author keywords

Access control; Communication channels; Communication system software; Computer science; Data security; Formal specifications; Information security; Protection; Secure storage; Timing

Indexed keywords

ACCESS CONTROL; COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTATIONAL LINGUISTICS; COMPUTER SCIENCE; COMPUTER SOFTWARE; DIGITAL STORAGE; FORMAL METHODS; FORMAL SPECIFICATION; LIFE CYCLE; NETWORK SECURITY; SECURITY OF DATA; SECURITY SYSTEMS; SPECIFICATION LANGUAGES; SPECIFICATIONS;

EID: 84948947266     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2002.1176284     Document Type: Conference Paper
Times cited : (52)

References (19)
  • 6
    • 0023292228 scopus 로고
    • An experience using two covert channel analysis techniques on a real system design
    • February
    • J. Haigh, R. Kemmerer, J. McHugh, and W. Young. An experience using two covert channel analysis techniques on a real system design. IEEE Transactions on Software Engineering, SE-13(2), February 1987
    • (1987) IEEE Transactions on Software Engineering , vol.SE-13 , Issue.2
    • Haigh, J.1    Kemmerer, R.2    McHugh, J.3    Young, W.4
  • 9
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • August
    • R. Kemmerer. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Transactions on Computer Systems, 1(3), August 1983
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3
    • Kemmerer, R.1
  • 10
    • 0026260664 scopus 로고
    • Covert flow trees: A visual approach to analyzing covert storage channels
    • November
    • R. Kemmerer and P. Porras. Covert flow trees: A visual approach to analyzing covert storage channels. IEEE Transactions on Software Engineering, SE-17(11):1166-1185, November 1991
    • (1991) IEEE Transactions on Software Engineering , vol.11 SE-17 , pp. 1166-1185
    • Kemmerer, R.1    Porras, P.2
  • 13
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. Lampson. A note on the confinement problem. Communications of the ACM, 16(1):613-615, 1973
    • (1973) Communications of the ACM , vol.16 , Issue.1 , pp. 613-615
    • Lampson, B.1
  • 17
    • 0016951438 scopus 로고
    • Security kernel validation in practice
    • May
    • J. Millen. Security kernel validation in practice. Communications of the ACM, 19:243-250, May 1976
    • (1976) Communications of the ACM , vol.19 , pp. 243-250
    • Millen, J.1
  • 18
    • 84949043129 scopus 로고
    • Technical Report WP-22554, The MITRE Corp., Bedford, MA, November
    • J. Millen and G. Huff. Flow table generator. Technical Report WP-22554, The MITRE Corp., Bedford, MA, November 1979
    • (1979) Flow Table Generator
    • Millen, J.1    Huff, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.