References

  1. K. Ahsan & D. Kundur (2002): Practical Data Hiding in TCP/IP. In: Workshop on Multimedia Security at ACM Multimedia '02.
  2. D.E Bell & J.J. La Padula (1973): Secure Computer Systems: a mathematical model. MITRE technical report 2547. MITRE. Vol II.
  3. D.E. Bell & J.J. La Padula (1973): Secure Computer Systems: mathematical foundations. MITRE Technical report 2547. MITRE. Vol I.
  4. T.M. Cover & J. A. Thomas (1991): Elements of Information Theory. Wiley.
  5. Common Criteria (1999): Common Criteria for Information Technology Security Evaluation Part 3: Security assurance requirements. Technical Report CCIMB-99-033. CCIMB.
  6. R. Focardi & R. Gorrieri (2000): Classification of Security Properties (Part I: Information Flow). In: FOSAD 2000, pp. 331–396.
  7. J Giles & B. Hajek (2002): An information-theoretic and game-theoretic study of timing channels. IEEE Transactions on Information Theory 48(9), pp. 2455–2477.
  8. J.A. Goguen & J. Meseguer (1982): Security policies and security Models. In: IEEE Computer Society Press: Proc of IEEE Symposium on Security and Privacy, pp. 11–20.
  9. L. Hélouët, M. Zeitoun & A. Degorre (2004): Scenarios and Covert channels, another game.... In: Games in Design and Verification, GDV '04, Electronic Notes in Theoretical Computer Science. Elsevier.
  10. L. Hélouët, M. Zeitoun & C. Jard (2003): Covert channels detection in protocols using scenarios. In: SPV'03 Security Protocols Verification.
  11. M.H Kang, I. Moskowitz & D.C. Lee (1996): A Network Pump. IEEE Trans. Software Eng. 22(5), pp. 329–338.
  12. R.A. Kemmerer (1983): Shared ressources matrix methodology: an approach to indentifying storage and timing channels. ACM transactions on Computer systems 1(3), pp. 256–277.
  13. B. Lampson (1973): A note on the confinement problem. Communication of the ACM 16(10), pp. 613–615.
  14. J. Millen (1987): Covert Channel Capacity. In: IEEE Symposium on Security and Privacy, pp. 60–66.
  15. I. Moskowitz & M. Kang (1994): Covert Channels - Here to stay ?. In: COMPASS'94. IEEE Press, pp. 235–243.
  16. S.J Murdoch & S. Lewis (2005): Embedding Covert Channels into TCP/IP. In: Information Hiding, pp. 247–261.
  17. NSA/NCSC (1993): A guide to Understanding Covert Channel Analysis of Trusted Systems. Technical Report. NSA/NCSC.
  18. A. Sabelfeld & A.C. Myers (2003): Language-based Information-flow security. IEEE Journal on selected areas in communications 21(1).
  19. C.E. Shannon (1958): Channels with Side Information at the Transmitter. IBM Journal of Research and Development 2(4), pp. 289–293.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org