Reducing Timing Channels with Fuzzy Time
暂无分享,去创建一个
[1] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[2] Mary Ellen Zurko,et al. A VMM security kernel for the VAX architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] C. Gray Girling,et al. Covert Channels in LAN's , 1987, IEEE Transactions on Software Engineering.
[4] Gerald J. Popek,et al. Verifiable secure operating system software , 1974, AFIPS '74.
[5] L. J. Fraim. Scomp: A Solution to the Multilevel Security Problem , 1983, Computer.
[6] Steven B. Lipner,et al. A comment on the confinement problem , 1975, SOSP.
[7] Keith Loepere. Resolving covert channels within a B2 class secure system , 1985, OPSR.
[8] John C. Wray,et al. An analysis of covert timing channels , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Wei-Ming Hu,et al. Lattice scheduling and covert channels , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[11] Timothy E. Leonard. VAX architecture reference manual , 1987 .
[12] Paul T. Robinson,et al. Virtualizing the VAX architecture , 1991, ISCA '91.