On the Identification of Covert Storage Channels in Secure Systems
IEEE Transactions on Software Engineering
A bandwidth computation model for covert storage channels and its applications
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Covert channel identification founded on information flow analysis
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hi-index | 0.00 |