ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Covert Channel Analysis of the Password-Capability System
Advances in Computer Systems Architecture - Lecture Notes in Computer Science
◽
10.1007/11572961_53
◽
2005
◽
pp. 655-668
◽
Cited By ~ 2
Author(s):
Dan Mossop
◽
Ronald Pose
Keyword(s):
Covert Channel
◽
Channel Analysis
Download Full-text
Related Documents
Cited By
References
A Guide to Understanding Covert Channel Analysis of Trusted Systems
10.21236/ada477386
◽
1993
◽
Author(s):
GREATER SAN ANTONIO HOSPITAL COUNCIL TX
Keyword(s):
Covert Channel
◽
Channel Analysis
Download Full-text
An entropy conservation law for testing the completeness of covert channel analysis
Proceedings of the 2nd ACM Conference on Computer and communications security - CCS '94
◽
10.1145/191177.191244
◽
1994
◽
Cited By ~ 4
Author(s):
Randy Browne
Keyword(s):
Conservation Law
◽
Covert Channel
◽
Channel Analysis
◽
Entropy Conservation
Download Full-text
Network covert channel analysis based on the density multilevel two segment clustering
2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)
◽
10.1109/icsess.2015.7339051
◽
2015
◽
Author(s):
Xuyang
◽
Zouchenpeng
◽
Yangning
Keyword(s):
Covert Channel
◽
Channel Analysis
◽
Network Covert Channel
Download Full-text
A kind of covert channel analysis method based on trusted pipeline
2011 International Conference on Electrical and Control Engineering
◽
10.1109/iceceng.2011.6058071
◽
2011
◽
Cited By ~ 1
Author(s):
Yu Sun
◽
Xing Zhang
Keyword(s):
Covert Channel
◽
Analysis Method
◽
Channel Analysis
Download Full-text
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design
IEEE Transactions on Software Engineering
◽
10.1109/tse.1987.226479
◽
1987
◽
Vol SE-13
(2)
◽
pp. 157-168
◽
Cited By ~ 11
Author(s):
J.T. Haigh
◽
R.A. Kemmerer
◽
J. Mchugh
◽
W.D. Young
Keyword(s):
System Design
◽
Real System
◽
Covert Channel
◽
Analysis Techniques
◽
Channel Analysis
Download Full-text
An Experience Using Two Covert Channel Analysis Techniques On a Real System Design
1986 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1986.10013
◽
1986
◽
Cited By ~ 23
Author(s):
J. Thomas Haigh
◽
Richard A. Kemmerer
◽
John McHugh
◽
William D. Young
Keyword(s):
System Design
◽
Real System
◽
Covert Channel
◽
Analysis Techniques
◽
Channel Analysis
Download Full-text
Timing Covert Channel Analysis of the VxWorks MILS Embedded Hypervisor under the Common Criteria Security Certification
Computers & Security
◽
10.1016/j.cose.2021.102307
◽
2021
◽
pp. 102307
Author(s):
Domenico Cotroneo
◽
Luigi De Simone
◽
Roberto Natella
Keyword(s):
Covert Channel
◽
Common Criteria
◽
Channel Analysis
◽
The Common
Download Full-text
Automatic Covert Channel Analysis of a Multilevel Secure Component
Information and Communications Security - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30191-2_20
◽
2004
◽
pp. 249-261
◽
Cited By ~ 3
Author(s):
Ruggero Lanotte
◽
Andrea Maggiolo-Schettini
◽
Simone Tini
◽
Angelo Troina
◽
Enrico Tronci
Keyword(s):
Covert Channel
◽
Channel Analysis
Download Full-text
A modular covert channel analysis methodology for trusted DG/UX/sup TM/
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569703
◽
2002
◽
Cited By ~ 4
Author(s):
R.A. Kemmerer
◽
T. Taylor
Keyword(s):
Covert Channel
◽
Analysis Methodology
◽
Channel Analysis
Download Full-text
Covert channel analysis for Stubs
Information Hiding - Lecture Notes in Computer Science
◽
10.1007/3-540-61996-8_34
◽
1996
◽
pp. 95-113
Author(s):
Mark S. Anderson
◽
Maris A. Ozols
Keyword(s):
Covert Channel
◽
Channel Analysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close