Building a secure computer system
Building a secure computer system
A pump for rapid, reliable, secure communication
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
ATM knits voice, data on any net
IEEE Spectrum
Communications of the ACM
A General Theory of Composition for a Class of "Possibilistic" Properties
IEEE Transactions on Software Engineering
The modulated-input modulated-output model
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
A note on the confinement problem
Communications of the ACM
Simulation Modeling and Analysis
Simulation Modeling and Analysis
I-TCP: indirect TCP for mobile hosts
ICDCS '95 Proceedings of the 15th International Conference on Distributed Computing Systems
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
A Mathematical Theory of Communication
A Mathematical Theory of Communication
A security model for dynamic adaptive traffic masking
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Guest Editorial: Introduction to the Special Section
IEEE Transactions on Software Engineering
A Multilevel Secure Workflow Management System
CAiSE '99 Proceedings of the 11th International Conference on Advanced Information Systems Engineering
Tool Support for Fine-Grained Software Inspection
IEEE Software
Secure composition of untrusted code: box π, wrappers, and causality types
Journal of Computer Security - CSFW13
Timing channels, anonymity, mixes, and spikes
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels
Formal Aspects in Security and Trust
High level specification of non-interference security policies in partitioned MLS systems
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Automatic Analysis of the NRL Pump
Electronic Notes in Theoretical Computer Science (ENTCS)
Noisy timing channels with binary inputs and outputs
IH'06 Proceedings of the 8th international conference on Information hiding
IQSM: an end-to-end IntServ QoS signaling mechanism for crypto-partitioned networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Multi-level security for service-oriented architectures
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Differential privacy under fire
SEC'11 Proceedings of the 20th USENIX conference on Security
Predictive mitigation of timing channels in interactive systems
Proceedings of the 18th ACM conference on Computer and communications security
Hi-index | 0.01 |
A designer of reliable multi-level secure (MLS) networks must consider covert channels and denial of service attacks in addition to traditional network performance measures such as throughput, fairness, and reliability. In this paper we show how to extend the NRL data Pump to a certain MLS network architecture in order to balance the requirements of congestion control, fairness, good performance, and reliability against those of minimal threats from covert channels and denial of service attacks. We back up our claims with simulation results.