A bandwidth computation model for covert storage channels and its applications
暂无分享,去创建一个
[1] Chii-Ren Tsai. Covert-channel analysis in secure computer systems , 1987 .
[2] J. C. Huskamp. Covert communication channels in timesharing systems , 1978 .
[3] Robert C. Daley,et al. An experimental time-sharing system , 1962, AIEE-IRE '62 (Spring).
[4] Virgil D. Gligor,et al. A Formal Method for the Identification of Covert Storage Channels in Source Code , 1987, 1987 IEEE Symposium on Security and Privacy.
[5] Virgil D. Gligor,et al. Design and Implementation of Secure Xenix , 1987, IEEE Transactions on Software Engineering.
[6] A. L. Scherr,et al. AN ANALYSIS OF TIME-SHARED COMPUTER SYSTEMS , 1965 .