메뉴 건너뛰기




Volumn 15, Issue 9, 2004, Pages 1385-1392

Covert channel analysis on ANSHENG secure operating system

Author keywords

ANSHENG secure operating system; Backward tracking approach; Covert channel analysis; Information flow; Storage channel

Indexed keywords

CALCULATIONS; COMMUNICATION CHANNELS (INFORMATION THEORY); SECURITY OF DATA;

EID: 8644251330     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (13)
  • 1
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson BW. A note on the confinement problem. CACM, 1973, 16(10): 613-615.
    • (1973) CACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 2
    • 0025438147 scopus 로고
    • A formal method for the identification of covert storage channels in source code
    • Tsai CR, Gligor VD, Chandersekaran CS. A formal method for the identification of covert storage channels in source code. IEEE Trans. on Software Engineering, 1990, 16(6): 569-580.
    • (1990) IEEE Trans. on Software Engineering , vol.16 , Issue.6 , pp. 569-580
    • Tsai, C.R.1    Gligor, V.D.2    Chandersekaran, C.S.3
  • 4
    • 0037906657 scopus 로고    scopus 로고
    • Classified criteria for security protection of computer information system
    • General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, GB18859-1999, Chinese source
    • General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China. Classified criteria for security protection of computer information system. GB18859-1999, 1999 (in Chinese).
    • (1999)
  • 6
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • Kemmerer RA. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. on Computer Systems, 1983, 1(3): 256-277.
    • (1983) ACM Trans. on Computer Systems , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 8
    • 8644270771 scopus 로고
    • Covert channel analysis: A chapter of the handbook for the computer security certification of trusted system
    • NRL Technical Memorandum 5540:062A
    • McHugh J. Covert channel analysis: A chapter of the handbook for the computer security certification of trusted system. NRL Technical Memorandum 5540:062A, 1995.
    • (1995)
    • McHugh, J.1
  • 10
  • 11
    • 0023855640 scopus 로고
    • A bandwidth computation model for covert storage channels and its applications
    • OakLand: IEEE Computer Society
    • Tsai CR, Gligor VD. A bandwidth computation model for covert storage channels and its applications. In: Proc. of the IEEE Symp. on Security and Privacy. OakLand: IEEE Computer Society, 1988. 108-121.
    • (1988) Proc. of the IEEE Symp. on Security and Privacy , pp. 108-121
    • Tsai, C.R.1    Gligor, V.D.2
  • 13
    • 8644285746 scopus 로고    scopus 로고
    • Covert channels analysis for the ANSHENG operating system
    • Technical Report, Beijing: Engineering Research Center for Information Security Technology, the Chinese Academy of Sciences, Chinese source
    • Zhu JF. Covert channels analysis for the ANSHENG operating system. Technical Report, Beijing: Engineering Research Center for Information Security Technology, the Chinese Academy of Sciences, 2003 (in Chinese).
    • (2003)
    • Zhu, J.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.