An Analysis of Covert Timing Channels
暂无分享,去创建一个
[1] Wei-Ming Hu,et al. Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Paul A. Karger,et al. Storage channels in disk arm optimization , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Steven B. Lipner,et al. A comment on the confinement problem , 1975, SOSP.
[4] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[5] Mary Ellen Zurko,et al. A VMM security kernel for the VAX architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Richard A. Kemmerer,et al. Shared resource matrix methodology: an approach to identifying storage and timing channels , 1983, TOCS.
[7] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[8] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[9] John C. Wray. A methodology for the detection of timing channels , 1991 .
[10] B. D. GOLD,et al. A security retrofit of VM/370 , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[11] Richard A. Kemmerer. A Practical Approach to Identifying Storage and Timing Channels , 1982, 1982 IEEE Symposium on Security and Privacy.