|
计算机科学 2000
The Study of Covert Channels Identification Techniques
|
Abstract:
We must analyse covert channels in the system(operating system or database management system)developed at or above B2 level.A secure computer system uses both discretionary and mandato-ry access controls to restrict the flow of information through legitimate communication channels.Covert channels are untrusted subjects at a higher security level who transfer information either using manipu-lation(I, e alteration)of some storage resources and the receivers at a lower security level monitor the al-terations or using modulation their running time to affect the receivers' response time.This paper shows several methods in covert channel identihcation and compares their advantages and disadvantages.