%0 Journal Article %T The Study of Covert Channels Identification Techniques
隐通道识别技术研究 %A 朱虹 %A 冯玉才 %J 计算机科学 %D 2000 %I %X We must analyse covert channels in the system(operating system or database management system)developed at or above B2 level.A secure computer system uses both discretionary and mandato-ry access controls to restrict the flow of information through legitimate communication channels.Covert channels are untrusted subjects at a higher security level who transfer information either using manipu-lation(I, e alteration)of some storage resources and the receivers at a lower security level monitor the al-terations or using modulation their running time to affect the receivers' response time.This paper shows several methods in covert channel identihcation and compares their advantages and disadvantages. %K Covert channel %K Trojan horse %K Multilevel security model
操作系统 %K 隐通道识别 %K 形式化方法 %K 计算机安全 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=B89DF8598703FF13&yid=9806D0D4EAA9BED3&vid=DB817633AA4F79B9&iid=94C357A881DFC066&sid=8C83C265AD318E34&eid=89F76E117E9BDB76&journal_id=1002-137X&journal_name=计算机科学&referenced_num=4&reference_num=9