期刊文献+

信息流安全性的隐通道分析与研究

Analysis and Research of Covert Channel of Information Flow Security
下载PDF
导出
摘要 隐通道是信息流安全性研究的关键问题,国内外学者通过分析隐通道对信息安全问题进行了研究。通过分析隐通道产生条件,对两种重要的隐通道的分析方法进行了比较,提出了较为科学的改进思路。 Covert channel is the key problem of the research of information flow security, so domestic and overseas scholars research the problem of information security through analyzing covert channel, Through analyzing the generating condition of covert channel, this paper compares two important analysis methods of covert channel, provides better improving approach
作者 谷千军 王越
出处 《计算机工程》 CAS CSCD 北大核心 2007年第6期137-138,共2页 Computer Engineering
关键词 信息流 隐通道 安全 Information flow Covert channel Security
  • 相关文献

参考文献7

  • 1Lampson B W.A Note on the Confinement Problem1[J].Communications of the ACM,1973,16(10):613-615.
  • 2Lipner S B.A Comment on the Confinement Problem[J].ACM SIGOPS Operating Systems Review,1975,9(9):192-196.
  • 3Department of Defense Standard 5200.28-STD-1985,Department of Defense Trusted Computer System Evaluation Criteria[S].1985-12:80.
  • 4Denning D E.A Lattice Model of Secure Information Flow[J].Communications of the ACM,1976,19(5):236-243.
  • 5Kemmerer R A.Shared Resource Matrix Methodology:An approach to Identifying Storage and Timing Channels[J].ACM Transactions on Computer Systems,1983,1(3).
  • 6Kemmerer R A.A Practical Approach to Identifying Storage and Timing Channels:Twenty Years Later[C]//Proc.of the 18^th Annual Computer Security Applications Conference.2002:109.
  • 7卿斯汉,朱继锋.安胜安全操作系统的隐蔽通道分析[J].软件学报,2004,15(9):1385-1392. 被引量:19

二级参考文献13

  • 1[1]Lampson BW. A note on the confinement problem. CACM, 1973,16(10):.613~615.
  • 2[2]Tsai CR, Gligor VD, Chandersekaran CS. A formal method for the identification of covert storage channels in source code. IEEE Trans. on Software Engineering, 1990,16(6):569~580.
  • 3[3]U.S. Department of Defense. Trusted Computer System Evaluation Criteria. DoD 5200.28-STD, 1985.
  • 4[4]General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China. Classfied criteria for security protection of computer information system. GB 18859-1999, 1999 (in Chinese).
  • 5[5]Qing SH, Ji QG. Formal model design for secure operating systems. In: ITI 1st Int'l Conf. on Information and Communications Technology. 2003.
  • 6[6]Kemmerer RA. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. on Computer Systems, 1983,1(3):256~277.
  • 7[7]Porras PA, Kemmerer RA. Covert flow trees: A technique for identifying and analyzing covert storage channels. In: Proc. of the 1991 IEEE Computer Society Symp. on Research in Security and Privacy. 1991.36~51.
  • 8[8]McHugh J. Covert channel analysis: A chapter of the handbook for the computer security certification of trusted system. NRL Technical Memorandum 5540:062A, 1995.
  • 9[9]Kemmerer RA, Taylor T. A modular covert channel analysis methodology for trusted DG/UX. In: Proc. of the 12th Annual Computer Security Applications Conf. Washington: IEEE Computer Society, 1996. 224~235.
  • 10[10]Millen JK. Finite-State noiseless covert channels. In: Proc. of the Computer Security Foundations Workshop. Franconia: IEEE Computer Society, 1989. 81~85.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部