An Analysis of the Timed-Channel
暂无分享,去创建一个
[1] Solomon W. Golomb,et al. The limiting behavior of the Z-channel (Corresp.) , 1980, IEEE Trans. Inf. Theory.
[2] Jonathan K. Millen. Finite-state noiseless covert channels , 1989, Proceedings of the Computer Security Foundations Workshop II,.
[3] John C. Wray. An Analysis of Covert Timing Channels , 1992, J. Comput. Secur..
[4] H. Rumsey,et al. Two Results On Binary-input Discrete Memoryless Channels , 1991, Proceedings. 1991 IEEE International Symposium on Information Theory.
[5] Ira S. Moskowitz,et al. Simple timing channels , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Steven B. Lipner,et al. A comment on the confinement problem , 1975, SOSP.
[7] David I. Havelock,et al. Geometric Precision in Noise-Free Digital Images , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[8] I. S. Moskowitz,et al. Reduction of a Class of Fox-Wright PSI Functions for Certain Rational Parameters , 1995 .
[9] E. Majani,et al. A model for the study of very noisy channels, and applications , 1988 .
[10] Ira S. Moskowitz,et al. A Network Pump , 1996, IEEE Trans. Software Eng..
[11] Daryl McCullough,et al. Covert Channels and Degrees of Insecurity , 1988, CSFW.
[12] Jonathan T. Trostle,et al. Modelling a fuzzy time system , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[13] Ira S. Moskowitz,et al. A Data Pump for Communication , 1995 .
[14] Ira S. Moskowitz,et al. An analysis of the timed Z-channel , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[15] Ira S. Moskowitz,et al. A pump for rapid, reliable, secure communication , 1993, CCS '93.
[16] Myong H. Kang,et al. An Implementation of the Pump: The Event Driven Pump. , 1996 .
[17] Ira S. Moskowitz,et al. The channel capacity of a certain noisy timing channel , 1992, IEEE Trans. Inf. Theory.
[18] Wei-Ming Hu. Reducing Timing Channels with Fuzzy Time , 1992, J. Comput. Secur..
[19] Maurice J. Bach. The Design of the UNIX Operating System , 1986 .
[20] J. C. Huskamp. Covert communication channels in timesharing systems , 1978 .
[21] Sergio Verdú,et al. On channel capacity per unit cost , 1990, IEEE Trans. Inf. Theory.
[22] Robert A. Scholtz,et al. Basic Concepts in Information Theory and Coding , 1994 .
[23] Oliver Costich,et al. Analysis of a storage channel in the two phase commit protocol , 1991, Proceedings Computer Security Foundations Workshop IV.
[24] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[25] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[26] Sang Hyuk Son,et al. Supporting security requirements in multilevel real-time databases , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[27] James W. Gray. On introducing noise into the bus-contention channel , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.