Some new covert channels have been found by the novel backward tracking approach.
应用新型的“回溯方法”发现了某些新的隐蔽通道。
Finally, we propose the appropriate solutions to these two kinds of covert channels.
并针对这两种隐通道分别提出相应的解决方案。
By research on the working principle of covert channels, the minimum criteria of its existence had been formally proved.
通过研究隐通道的工作原理,形式化地证明了隐通道存在的最小条件。
For the identified covert channels, accurate bandwidth computation and appropriate covert-channel handling have been performed.
对被标识的隐蔽通道,准确地计算了它们的带宽,并进行了适当的隐蔽通道处理。
In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving...
通过引入多实例和伪元组,并重新定义读写规则,使改进后的模型更具安全性、灵活性和可用性。
This paper presents a class of specific covert channels in database system-the covert channel using referential integrity. We compute their bandwidth and propose the methods to handle them.
该文提出了一类数据库系统所特有的隐通道一利用引用完整性约束传送信息的隐通道,分析了它们的带宽,并提出了处理这类隐通道的方法。
These were not only offered the theory bedrock for the work of search and eliminate covert channels, but also given a frame for develop new search and elimination methods in covert channels.
这些工作不仅为隐通道的搜索与消除工作提供了可信的理论依据,而且为寻找新的隐通道搜索与消除方法提供了一个研究框架。
To develop a database management system at or above B2 level, we must audit the use of covert storage channels.
开发具有B2安全级及以上的数据库管理系统必须对存储隐通道进行审计。
But such algorithms introduce the covert timing channels, and may cause the leakage of top secret information.
但是,这种算法会引入时间隐通道,可能致使机密信息泄露。
The results of simulation show that the proposed multi-state network covert timing channels with higher channel capacity and all have their own characteristics and the practical value.
仿真实例结果表明,提出的三种多进制网络时间隐蔽信道具有较高的信道容量,各有特点和实用价值。
The results of simulation show that the proposed multi-state network covert timing channels with higher channel capacity and all have their own characteristics and the practical value.
仿真实例结果表明,提出的三种多进制网络时间隐蔽信道具有较高的信道容量,各有特点和实用价值。
应用推荐