1Lampson B.A Note on the Confinement Problem[J].Communication of the ACM,1973,16(10):613-615.
2NCSC.NCSC-TG-030-1993 A Guide to Understand Covert Channel Analysis of Trusted System[S].1993.
3Ahsan K.Covert Channel Analysis and Data Hiding in TCP/IP[D].Toronto,Ontario,Canada:University of Toronto,2002.
4Rowland C H.Covert Channel in the TCP/IP Protocol Suite[J].IEEE Transactions on Signal Processing,1997,45(11):2758-2765.
5Handle T,Sanford M.Hiding Data in the OSI Network Model[C]// Proceedings of the 1st International Workshop on Information.Hiding.Cambridge,U.K.:[s.n.],1996.