Protection against covert storage and timing channels
- 10 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- Data dependency graphs for Ada programsIEEE Transactions on Software Engineering, 1990
- A Formal Method for the Identification of Covert Storage Channels in Source CodePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Shared resource matrix methodologyACM Transactions on Computer Systems, 1983
- Dependence graphs and compiler optimizationsPublished by Association for Computing Machinery (ACM) ,1981
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- Certification of programs for secure information flowCommunications of the ACM, 1977
- Graph grammars and global program data flow analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1976
- Security Kernel validation in practiceCommunications of the ACM, 1976
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976
- A note on the confinement problemCommunications of the ACM, 1973