期刊文献+

隐蔽通道发现技术综述 被引量:5

A Survey on Covert Channel Identification
下载PDF
导出
摘要 本文首先解释了隐蔽通道的概念,介绍了隐蔽通道的分类。然后花主要精力,结合实例概述了当代国际上已经使用过的隐蔽通道的方法。并且对目前已有的这些方法从不同的方面给出了对比性的评价。在文章的讨论部分,作者基于目前的形势以及传统发现方法的限制给出了针对隐蔽通道发现方法建设性的见解和展望。 This paper begins with the introduction of the notion or the definition of covert channel. After explaining the classification of the covert channels, it spent most of its words on the covert channel identification methods currently available in the CCA (covert channel analysis)community. Then it compares the methods with each other in different as pects. In the discussion session, the paper analyzes the limitations of these methods and gives out some constructive suggestions.
出处 《计算机科学》 CSCD 北大核心 2006年第12期1-5,共5页 Computer Science
基金 国家高技术研究发展计划863课题(2001AA144010)资助。
关键词 隐蔽通道 安全系统 机密性 安全保护 信息流安全 overt channel, Security system, Confidentiality, Security protection, Information flow security
  • 相关文献

参考文献18

  • 1Lampson B W. A Note on the Confinement Problem. Communications of the ACM, 1973,16(10): 613-615
  • 2National Computer Security Center, Department of Defense.Trusted Computer System Evaluation Criteria. DoD 5200. 28-STD, December 1985
  • 3Sabelfeld A, Myers A. Language-based informatlonflow security.IEEE Journal on Selected Areas in Communications, 2003,21(1)
  • 4Lipner S D. A Comment on the Confinement Problem. Operating Systems Review, 1975,9(5): 192-198
  • 5Schroeder M D, Clark D D, Saltzer J H. The Multics Kernel Design Project In:Proeeedings of the 6th ACM Symposium on Operating Systems Principles
  • 6Wray J C. An Analysis of Covert Timing Channels. In: Proceedings of the IEEE Symposium on Research in Security and Privacy,Oakland, California,May 1991.2-7
  • 7Kemmerer R A. Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Transactions on Computer Systems, 1981,1 (3):256-277
  • 8Goguen J A, Meseguer J. Security Policies and Security Models.In:Proceedings of the IEEE Symposium on Security and Privacy,Oakland, California, April 1982. 11-20
  • 9Goguen J A,Meseguer J. Unwinding and Inference Control. In:Proceedings of the IEEE Symposium on Security and Privacy,Oakland, California, April 1984. 75-86
  • 10Boebert W E, Kain R Y, Young W D. Secure Computing: The Secure Ada Target Approach. Scientific Honeyweller, July 1985,6(2):1-17

同被引文献22

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部