Information theory for information technologists
Information theory for information technologists
The X-Kernel: An Architecture for Implementing Network Protocols
IEEE Transactions on Software Engineering
A pump for rapid, reliable, secure communication
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Several secure store and forward devices
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
A Case Study Of Two Nrl Pump Prototypes
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Three paradigms in computer security
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Noisy timing channels with binary inputs and outputs
IH'06 Proceedings of the 8th international conference on Information hiding
Hi-index | 0.00 |
With the increasing growth of electronic communications, it is becoming important to provide a mechanism for enforcing various security policies on network communications. This paper discusses our implementation of several previously proposed protocols that enforce the Bell-LaPadula (1973) security model. We also introduce a new protocol called "Quantized Pump" that offers several advantages, and present experimental results to support our claims.