@book(Baader2003aa, editor = "F. Baader and D.L. McGuinness and D. Nardi and P.F. {Patel-Schneider}", year = "2003", title = "The Description Logic Handbook: Theory, Implementation, and Applications", publisher = "Cambridge University Press", ) @inproceedings(Gianvecchio2007aa, author = "S. Gianvecchio and H. Wang", year = "2007", title = "Detecting Covert Timing Channels: An Entropy-Based Approach", booktitle = "Proceedings of the 14th ACM Conference on Computer and Communications Security", series = "CCS '07", publisher = "ACM", pages = "307--316", doi = "10.1145/1315245.1315284", ) @article(Giles2002aa, author = "J. Giles and B. Hajek", year = "2002", title = "An Information-Theoretic and Game-Theoretic Study of Timing Channels", journal = "IEEE Transactions on Information Theory", volume = "48", number = "9", pages = "2455--2477", doi = "10.1109/TIT.2002.801405", ) @inproceedings(Giles1999aa, author = "J.R. Giles and B. Hajek", year = "1999", title = "The Jamming Game for Timing Channels", booktitle = "Proceedings of the 1999 Information Theory and Networking Workshop", pages = "35", doi = "10.1109/ITNW.1999.814345", ) @inproceedings(Gray1991aa, author = "J.W. {Gray III}", year = "1991", title = "Toward a Mathematical Foundation for Information Flow Security", booktitle = "Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy", pages = "21--34", doi = "10.1109/RISP.1991.130769", ) @book(Hebisch1993aa, author = "U. Hebisch and H.J. Weinert", year = "1993", title = "Semirings: Algebraic Theory and Applications in Computer Science", series = "Series in Algebra", volume = "5", publisher = "World Scientific", ) @inproceedings(Helouet2010aa, author = "L. H{\'e}lou{\"e}t and A. Roumy", year = "2010", title = "Covert Channel Detection Using Information Theory", editor = "K. Chatzikokolakis and V. Cortier", booktitle = "Proceedings of 8th International Workshop on Security Issues in Concurrency", series = "SecCo 2010", pages = "34--51", doi = "10.4204/EPTCS.51.3", ) @incollection(Hoare2009aa, author = "C.A.R. Hoare and B. M{\"o}ller and G. Struth and I. Wehrman", year = "2009", title = "Concurrent {Kleene} Algebra", editor = "M. Bravetti and G. Zavattaro", booktitle = "Proceedings of the 20th International Conference on Concurrency Theory", series = "LNCS", volume = "5710", publisher = "Springer Berlin / Heidelberg", pages = "399--414", doi = "10.1007/978-3-642-04081-8\_27", ) @incollection(Hoare2009ab, author = "C.A.R. Hoare and B. M{\"o}ller and G. Struth and I. Wehrman", year = "2009", title = "Foundations of Concurrent {Kleene} Algebra", editor = "R. Berghammer and A. Jaoua and B. M{\"o}ller", booktitle = "Relations and Kleene Algebra in Computer Science", series = "LNCS", volume = "5827", publisher = "Springer Berlin / Heidelberg", pages = "166--186", doi = "10.1007/978-3-642-04639-1\_12", ) @techreport(Hoare2010aa, author = "C.A.R. Hoare and B. M{\"o}ller and G. Struth and I. Wehrman", year = "2010", title = "Concurrent {Kleene} Algebra and its Foundations", type = "Technical Report", number = "CS-10-04", institution = "University of Sheffield, Department of Computer Science", address = "Sheffield, UK", note = "Available: \url {http://www.dcs.shef.ac.uk/~georg/ka/}", ) @article(Hoare2011aa, author = "C.A.R. Hoare and B. M{\"o}ller and G. Struth and I. Wehrman", year = "2011", title = "Concurrent {Kleene} Algebra and its Foundations", journal = "Journal of Logic and Algebraic Programming", volume = "80", number = "6", pages = "266 -- 296", doi = "10.1016/j.jlap.2011.04.005", ) @mastersthesis(Jaskolka2010aa, author = "J. Jaskolka", year = "2010", title = "Modeling, Analysis, and Detection of Information Leakage via Protocol-Based Covert Channels", school = "McMaster University", address = "Hamilton, ON, Canada", ) @inproceedings(Jaskolka2011aa, author = "J. Jaskolka and R. Khedri", year = "2011", title = "Exploring Covert Channels", booktitle = "Proceedings of the 44th Hawaii International Conference on System Sciences", series = "HICSS-44", pages = "1--10", doi = "10.1109/HICSS.2011.201", ) @inproceedings(Jaskolka2011ac, author = "J. Jaskolka and R. Khedri and K.E. Sabri", year = "2011", title = "A Formal Test for Detecting Information Leakage via Covert Channels", booktitle = "Proceedings of the 7th Annual Cyber Security and Information Intelligence Research Workshop", series = "CSIIRW7", pages = "1--4", doi = "10.1145/2179298.2179343", ) @article(Jaskolka2012aa, author = "J. Jaskolka and R. Khedri and Q. Zhang", year = "2012", title = "On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey", journal = "Procedia Computer Science", volume = "10", pages = "458 -- 465", doi = "10.1016/j.procs.2012.06.059", ) @techreport(Jaskolka2013aa, author = "J. Jaskolka and R. Khedri and Q. Zhang", year = "2013", title = "Foundations of Communicating Concurrent {Kleene} Algebra", type = "Technical Report", number = "CAS-13-07-RK", institution = "McMaster University", address = "Hamilton, ON, Canada", note = "Available: \url {http://www.cas.mcmaster.ca/cas/0template1.php?601}", ) @incollection(Jaskolka2014aa, author = "J. Jaskolka and R. Khedri and Q. Zhang", year = "2014", title = "Endowing Concurrent {Kleene} Algebra with Communication Actions", editor = "P. H\"{o}fner and P. Jipsen and W. Kahl and M.E. M\"{u}ller", booktitle = "Proceedings of the 14th International Conference on Relational and Algebraic Methods in Computer Science", series = "LNCS", volume = "8428", publisher = "Springer International Publishing Switzerland", pages = "19--36", doi = "10.1007/978-3-319-06251-8\_2", ) @inproceedings(Johnson2010aa, author = "D. Johnson and P. Lutz and B. Yuan", year = "2010", title = "Behavior-Based Covert Channel in Cyberspace", booktitle = "Proceedings of the 4th International ISKE Conference on Intelligent Decision Making Systems", pages = "311--318", doi = "10.1142/9789814295062\_0049", ) @inproceedings(Kang1993aa, author = "M.H. Kang and I.S. Moskowitz", year = "1993", title = "A Pump for Rapid, Reliable, Secure Communication", booktitle = "Proceedings of the 1st ACM Conference on Computer and Communications Security", pages = "119--129", doi = "10.1145/168588.168604", ) @article(Kemmerer1983aa, author = "R.A. Kemmerer", year = "1983", title = "Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels", journal = "ACM Transactions on Computer Systems", volume = "1", number = "3", pages = "256--277", doi = "10.1145/357369.357374", ) @article(Kemmerer1991aa, author = "R.A. Kemmerer and P.A. Porras", year = "1991", title = "Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels", journal = "IEEE Transactions on Software Engineering", volume = "17", number = "11", pages = "1166--1185", doi = "10.1109/32.106972", ) @book(Kilp2000aa, author = "M. Kilp and U. Knauer and A.V. Mikhalev", year = "2000", title = "Monoids, Acts And Categories With Applications to Wreath Products and Graphs: A Handbook for Students and Researchers", series = "De Gruyter Expositions in Mathematics Series", volume = "29", publisher = "Walter de Gruyter", doi = "10.1515/9783110812909", ) @inproceedings(Lowe2002aa, author = "G. Lowe", year = "2002", title = "Quantifying Information Flow", booktitle = "Proceedings of the 15th IEEE Computer Security Foundations Workshop", series = "CSFW-15", publisher = "IEEE Computer Society", pages = "18--31", doi = "10.1109/CSFW.2002.1021804", ) @article(Martin2006aa, author = "K. Martin and I.S. Moskowitz and G. Allwein", year = "2006", title = "Algebraic Information Theory For Binary Channels", journal = "Electronic Notes in Theoretical Computer Science", volume = "158", pages = "289--306", doi = "10.1016/j.entcs.2006.04.015", ) @inproceedings(Millen1987aa, author = "J.K. Millen", year = "1987", title = "Covert Channel Capacity", booktitle = "Proceedings of the 1987 Symposium on Security and Privacy", pages = "60--66", ) @inproceedings(Millen1989aa, author = "J.K. Millen", year = "1989", title = "Finite-State Noiseless Covert Channels", booktitle = "Proceedings of the Computer Security Foundations Workshop II", pages = "81--86", doi = "10.1109/CSFW.1989.40590", ) @book(Milner1989aa, author = "R. Milner", year = "1989", title = "Communication and Concurrency", series = "Prentice-Hall International Series in Computer Science", publisher = "Prentice Hall", ) @inproceedings(Moskowitz1994aa, author = "I.S. Moskowitz and M.H. Kang", year = "1994", title = "Covert Channels - Here to Stay?", booktitle = "Computer Assurance", series = "COMPASS '94 Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security", pages = "235--243", doi = "10.1109/CMPASS.1994.318449", ) @inproceedings(Sabri2009aa, author = "K.E. Sabri and R. Khedri and J. Jaskolka", year = "2009", title = "Verification of Information Flow in Agent-Based Systems", editor = "G. Babin and P. Kropf and M. Weiss", booktitle = "Proceedings of the 4th International MCETECH Conference on e-Technologies", series = "LNBIP", volume = "26", publisher = "Springer Berlin / Heidelberg", pages = "252--266", doi = "10.1007/978-3-642-01187-0\_22", ) @article(Shieh1999aa, author = "S. Shieh and A.L.P. Chen", year = "1999", title = "Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems", journal = "Journal of Information Science and Engineering", volume = "15", number = "1", pages = "91--106", ) @book(DoD1985aa, author = "{U.S.A. Department of Defense}", year = "1985", title = "Trusted Computer System Evaluation Criteria (TCSEC)", series = "Defense Department Rainbow Series (Orange Book)", volume = "DoD 5200.28-STD", publisher = "Department of Defense / National Computer Security Center", address = "Fort George G. Meade, MD, USA", ) @booklet(DoHS2009aa, author = "{U.S.A. Department of Homeland Security}", year = "2009", title = "A Roadmap for Cybersecurity Research", howpublished = "Department of Homeland Security Science and Technology Directorate", address = "Washington, DC, USA", ) @incollection(Wang2005aa, author = "Z. Wang and R.B. Lee", year = "2005", title = "New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation", editor = "J. Zhou and J. Lopez and R.H. Deng and F. Bao", booktitle = "Proceedings of 8th International Conference on Information Security", series = "LNCS", volume = "3650", publisher = "Springer Berlin / Heidelberg", pages = "498--505", doi = "10.1007/11556992\_37", )