完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Shieh, SP | en_US |
dc.date.accessioned | 2014-12-08T15:47:08Z | - |
dc.date.available | 2014-12-08T15:47:08Z | - |
dc.date.issued | 1999-01-01 | en_US |
dc.identifier.issn | 1016-2364 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/31630 | - |
dc.description.abstract | Covert channels are illicit means of leaking sensitive or private information through system global variables that usually are not part of the interpretation of data objects in the security model. We discovered that some covert channels can be modeled as finite-stare graphs while others cannot. By using various techniques given in the paper, multiple bits of information can be simultaneously transferred through single or multiple covert channels. We present methods to determine and estimate the maximum bandwidths of both finite-state and infinite-state channels, and give the problems and basic rules for their measurement. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | covert channel bandwidth | en_US |
dc.subject | multilevel secure systems | en_US |
dc.subject | system calls | en_US |
dc.title | Estimating and measuring covert channel bandwidth in multilevel secure operating systems | en_US |
dc.type | Article | en_US |
dc.identifier.journal | JOURNAL OF INFORMATION SCIENCE AND ENGINEERING | en_US |
dc.citation.volume | 15 | en_US |
dc.citation.issue | 1 | en_US |
dc.citation.spage | 91 | en_US |
dc.citation.epage | 106 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000078456800007 | - |
dc.citation.woscount | 7 | - |
顯示於類別: | 期刊論文 |