K. Ahsan & D. Kundur (2002):
Practical Data Hiding in TCP/IP.
In: Workshop on Multimedia Security at ACM Multimedia '02.
D.E Bell & J.J. La Padula (1973):
Secure Computer Systems: a mathematical model.
MITRE technical report 2547.
MITRE.
Vol II.
D.E. Bell & J.J. La Padula (1973):
Secure Computer Systems: mathematical foundations.
MITRE Technical report 2547.
MITRE.
Vol I.
T.M. Cover & J. A. Thomas (1991):
Elements of Information Theory.
Wiley.
Common Criteria (1999):
Common Criteria for Information Technology Security Evaluation Part 3: Security assurance requirements.
Technical Report CCIMB-99-033.
CCIMB.
R. Focardi & R. Gorrieri (2000):
Classification of Security Properties (Part I: Information Flow).
In: FOSAD 2000,
pp. 331–396.
J Giles & B. Hajek (2002):
An information-theoretic and game-theoretic study of timing channels.
IEEE Transactions on Information Theory 48(9),
pp. 2455–2477.
J.A. Goguen & J. Meseguer (1982):
Security policies and security Models.
In: IEEE Computer Society Press: Proc of IEEE Symposium on Security and Privacy,
pp. 11–20.
L. Hélouët, M. Zeitoun & A. Degorre (2004):
Scenarios and Covert channels, another game....
In: Games in Design and Verification, GDV '04,
Electronic Notes in Theoretical Computer Science.
Elsevier.
L. Hélouët, M. Zeitoun & C. Jard (2003):
Covert channels detection in protocols using scenarios.
In: SPV'03 Security Protocols Verification.
M.H Kang, I. Moskowitz & D.C. Lee (1996):
A Network Pump.
IEEE Trans. Software Eng. 22(5),
pp. 329–338.
R.A. Kemmerer (1983):
Shared ressources matrix methodology: an approach to indentifying storage and timing channels.
ACM transactions on Computer systems 1(3),
pp. 256–277.
B. Lampson (1973):
A note on the confinement problem.
Communication of the ACM 16(10),
pp. 613–615.
J. Millen (1987):
Covert Channel Capacity.
In: IEEE Symposium on Security and Privacy,
pp. 60–66.
I. Moskowitz & M. Kang (1994):
Covert Channels - Here to stay ?.
In: COMPASS'94.
IEEE Press,
pp. 235–243.
S.J Murdoch & S. Lewis (2005):
Embedding Covert Channels into TCP/IP.
In: Information Hiding,
pp. 247–261.
NSA/NCSC (1993):
A guide to Understanding Covert Channel Analysis of Trusted Systems.
Technical Report.
NSA/NCSC.
A. Sabelfeld & A.C. Myers (2003):
Language-based Information-flow security.
IEEE Journal on selected areas in communications 21(1).
C.E. Shannon (1958):
Channels with Side Information at the Transmitter.
IBM Journal of Research and Development 2(4),
pp. 289–293.