%0 Journal Article
%T The Study of Covert Channels Identification Techniques
隐通道识别技术研究
%A 朱虹
%A 冯玉才
%J 计算机科学
%D 2000
%I
%X We must analyse covert channels in the system(operating system or database management system)developed at or above B2 level.A secure computer system uses both discretionary and mandato-ry access controls to restrict the flow of information through legitimate communication channels.Covert channels are untrusted subjects at a higher security level who transfer information either using manipu-lation(I, e alteration)of some storage resources and the receivers at a lower security level monitor the al-terations or using modulation their running time to affect the receivers' response time.This paper shows several methods in covert channel identihcation and compares their advantages and disadvantages.
%K Covert channel
%K Trojan horse
%K Multilevel security model
操作系统
%K 隐通道识别
%K 形式化方法
%K 计算机安全
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=B89DF8598703FF13&yid=9806D0D4EAA9BED3&vid=DB817633AA4F79B9&iid=94C357A881DFC066&sid=8C83C265AD318E34&eid=89F76E117E9BDB76&journal_id=1002-137X&journal_name=计算机科学&referenced_num=4&reference_num=9