Covert Channel Elimination Protocols
暂无分享,去创建一个
[1] William J. Bolosky,et al. Mach: A New Kernel Foundation for UNIX Development , 1986, USENIX Summer.
[2] John C. Wray. An Analysis of Covert Timing Channels , 1992, J. Comput. Secur..
[3] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[4] Jonathan K. Millen. Finite-state noiseless covert channels , 1989, Proceedings of the Computer Security Foundations Workshop II,.
[5] Ira S. Moskowitz,et al. A pump for rapid, reliable, secure communication , 1993, CCS '93.
[6] M. J. Usher. Information Theory for Information Technologists , 1984 .
[7] Larry L. Peterson,et al. The x-Kernel: An Architecture for Implementing Network Protocols , 1991, IEEE Trans. Software Eng..
[8] John P. McDermott. The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems , 1994, DBSec.
[9] Ira S. Moskowitz,et al. Simple timing channels , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] Ira S. Moskowitz,et al. A network version of the Pump , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[11] David M. Goldschlag. Several secure store and forward devices , 1996, CCS '96.
[12] I. S. Moskowitz,et al. Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.
[13] Ira S. Moskowitz,et al. A Data Pump for Communication , 1995 .