共 11 条
[1]
Anexperienceusingtwocovertchannelanalysistech-niquesonarealsystemdesign. JHaighetal. IEEEtransactionsonsoftwareen-gineering . 1987
[2]
SimpleTimingChannel. IraSMoskowitsetal. proceedingsoftheIEEEcomputersocietysymposiumonresearchinsecurityandprivacy . 1994
[3]
20yearsofcovertchannelmodelingandanalysis. JMillen. 99’’IEEEsecurityandprivacysymposium .
[4]
SharedResourceMatrixMethodology:Anapproachtoi-dentifyingstorageandtimingchannel. RKemmerer. . 1983
[5]
aformalmethodfortheidentificationofcovertstoragechannelsinsourcecode. CTsaietal. 87’’IEEEsymposiumonsecurityandprivacy .
[6]
noteontheconfinementproblem. BLampsonetal. Communican-tionsoftheACM . 1993
[7]
SecurityPoliciesandSecurityModels. JAGoguen,JMeseguer. ProceedingsoftheIEEESymposiumonSecurityandPrivacy . 1982
[8]
InformationFlowAnalysisforCovert-ChannelI-dentificationinMultilevelSecureOperatingSystems. JNe,VDGligor. Proceedingsofthe3rdIEEEWorkshoponComputerSecurityFoundations . 1990
[9]
MulticsSecurityModel-BellandLaPadula,MulticsDesignDocumentMOD-002. HoneywellInformationSystemsInc. . 1985
[10]
Transformingouttimingleaks. JAgat. 27thannualACMsigplan-sigactsymposiumonprinciplesofprograminglanguagesboston . 2000