Experimental results of covert channel limitation in one-way communication systems
暂无分享,去创建一个
[1] David M. Goldschlag. Several secure store and forward devices , 1996, CCS '96.
[2] Ira S. Moskowitz,et al. A case study of two NRL Pump prototypes , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[3] M. J. Usher. Information Theory for Information Technologists , 1984 .
[4] I. S. Moskowitz,et al. Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.
[5] Larry L. Peterson,et al. The x-Kernel: An Architecture for Implementing Network Protocols , 1991, IEEE Trans. Software Eng..
[6] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[7] John P. McDermott. The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems , 1994, DBSec.
[8] Ira S. Moskowitz,et al. Simple timing channels , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Ira S. Moskowitz,et al. A network version of the Pump , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[10] Jonathan K. Millen. Finite-state noiseless covert channels , 1989, Proceedings of the Computer Security Foundations Workshop II,.
[11] Ira S. Moskowitz,et al. A Data Pump for Communication , 1995 .
[12] William J. Bolosky,et al. Mach: A New Kernel Foundation for UNIX Development , 1986, USENIX Summer.
[13] John C. Wray. An Analysis of Covert Timing Channels , 1992, J. Comput. Secur..
[14] Ira S. Moskowitz,et al. A pump for rapid, reliable, secure communication , 1993, CCS '93.