全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

The Study of Covert Channels Identification Techniques
隐通道识别技术研究

Keywords: Covert channel,Trojan horse,Multilevel security model
操作系统
,隐通道识别,形式化方法,计算机安全

Full-Text   Cite this paper   Add to My Lib

Abstract:

We must analyse covert channels in the system(operating system or database management system)developed at or above B2 level.A secure computer system uses both discretionary and mandato-ry access controls to restrict the flow of information through legitimate communication channels.Covert channels are untrusted subjects at a higher security level who transfer information either using manipu-lation(I, e alteration)of some storage resources and the receivers at a lower security level monitor the al-terations or using modulation their running time to affect the receivers' response time.This paper shows several methods in covert channel identihcation and compares their advantages and disadvantages.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133