Full metadata record
DC FieldValueLanguage
dc.contributor.authorShieh, SPen_US
dc.date.accessioned2014-12-08T15:47:08Z-
dc.date.available2014-12-08T15:47:08Z-
dc.date.issued1999-01-01en_US
dc.identifier.issn1016-2364en_US
dc.identifier.urihttp://hdl.handle.net/11536/31630-
dc.description.abstractCovert channels are illicit means of leaking sensitive or private information through system global variables that usually are not part of the interpretation of data objects in the security model. We discovered that some covert channels can be modeled as finite-stare graphs while others cannot. By using various techniques given in the paper, multiple bits of information can be simultaneously transferred through single or multiple covert channels. We present methods to determine and estimate the maximum bandwidths of both finite-state and infinite-state channels, and give the problems and basic rules for their measurement.en_US
dc.language.isoen_USen_US
dc.subjectcovert channel bandwidthen_US
dc.subjectmultilevel secure systemsen_US
dc.subjectsystem callsen_US
dc.titleEstimating and measuring covert channel bandwidth in multilevel secure operating systemsen_US
dc.typeArticleen_US
dc.identifier.journalJOURNAL OF INFORMATION SCIENCE AND ENGINEERINGen_US
dc.citation.volume15en_US
dc.citation.issue1en_US
dc.citation.spage91en_US
dc.citation.epage106en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000078456800007-
dc.citation.woscount7-
Appears in Collections:Articles


Files in This Item:

  1. 000078456800007.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.