期刊文献+

数据库系统隐蔽通道分析的设计 被引量:1

Design of Database System Covert Channel Analysis
下载PDF
导出
摘要 从隐蔽通道概念入手,阐述了隐蔽通道分析在Oracle中的设计思想,讨论了隐蔽通道分析的内容与层次、隐蔽通道的标识方法、隐蔽通道带宽的计算与测量、隐蔽通道的处理,就如何提高Oracle9i安全性能提供了一种途径。 This paper elaborates a way of thinking about covert channel analysis in Oracle from the concept of covert channel, discusses contents and levels of covert channel analysis, the mark method of covert channel, the calculation and measurement of covert channel band width and the processing of covert channel, which provides a new way of improving Oracle 9i's security performance.
出处 《计算机工程》 CAS CSCD 北大核心 2006年第18期133-134,154,共3页 Computer Engineering
关键词 数据库安全 B2级安全 隐蔽通道标识 隐蔽通道处理 Database security B2 level security Covert channel mark Covert channel processing
  • 相关文献

参考文献7

  • 1中华人民共和国公安部.GA/T-387-2002.计算机信息系统安全等级保护DBMS技术要求[S].2002.
  • 2U.S.Department of Defense.DoD 5200.28-STD,CSC-STD-001-83.Trusted Computer System Evaluation Criteria[S].1985-12-26.
  • 3Schaefer M,Gold B,Linde R,et al.Program Confinement in KVM/370[C].Proceedings of the Annual ACM Conference,New York,1977:404-410.
  • 4Huskamp J C.Covert Communication Channels in Timesharing System[R].University of California,1978.
  • 5Kemmerer R A.Shared Resource Matrix Methodology:An Approach to Identifying Storage and Timing Channels[J].ACM Transactions on Computer Systems,1983,1(3):256-277.
  • 6Tsai C R,Gligor V D,Chandersekaran C S.A Formal Method for the Identification of Covert Storage Channels in Source Code[C].Proc.of IEEE Symposium on Security and Privacy,Oakland,CA,1987:74-86.
  • 7卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:31

二级参考文献27

  • 1Kemmerer RA, Taylor TA. Modular covert channel analysis methodology for trusted DG/UXTM. IEEE Trans. on Software Engineering, Vol. 22, 1996.
  • 2Denning DE. A lattice model of secure information flow. Communications of the ACM, 1976. 236-243.
  • 3He J, Gligor VD. Information flow analysis for covert-channel identification in multilevel secure operating systems. In: Proc. of the 3rd IEEE Workshop on Computer Security Foundations. 1990. 139-148.
  • 4Feiertag R. A technique for proving specifications are multilevel secure. Technical Report CSL-109, 1980.
  • 5Feiertag R, Levitt KN, Robinson L. Proving multilevel security of a system design. In: Proc. of the 6th ACM Symp. on Operating Systems Principles. 1977.57-65.
  • 6Goguen JA, Meseguer J. Security policies and security models. In: Proc. of the IEEE Symp. on Security and Privacy. 1982. 11-20.
  • 7Millen JK. Foundations of covert-channel detection. Technical Report MTR-10538, The M1TRE Corporation, 1989.
  • 8Goguen JA, Meseguer J. Unwinding and inference vontrol. In: Proc. of the IEEE Symp. on Security and Privacy. 1984. 75-86.
  • 9Haigh JT, Kemmerer RA, McHugh J, Young WD. An experience using two covert channel analysis techniques on a real system design. IEEE Trans. on Software Engineering, 1987. 157-168.
  • 10Millen JK. Finite-State noiseless covert channels. In: Proc. of the Computer Security Foundations Workshop. 1989.81-85.

共引文献30

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部