DocumentCode :
1842829
Title :
Towards a model of storage jamming
Author :
McDermott, John ; Goldschlag, David
Author_Institution :
Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
fYear :
1996
fDate :
10-12 Jun 1996
Firstpage :
176
Lastpage :
185
Abstract :
Storage jamming can degrade real-world activities that share stored data. Storage jamming is not prevented by access controls or cryptographic techniques. Verification to rule out storage jamming logic is impractical for shrink-wrapped software or low-cost custom applications. Detection mechanisms do offer more promise. In this paper, we model storage jamming and a detection mechanism, using Unity logic. We find that Unity logic, in conjunction with some high-level operators, models storage jamming in a natural way and allows us to reason about susceptibility, rate of jamming, and impact on persistent values
Keywords :
access control; cryptography; security of data; Unity logic; access controls; cryptographic techniques; detection mechanism; high-level operators; persistent values; rate of jamming; storage jamming model; susceptibility; Access control; Application software; Cryptography; Database systems; Degradation; Information systems; Invasive software; Jamming; Laboratories; Logic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 1996. Proceedings., 9th IEEE
Conference_Location :
Kenmare
ISSN :
1063-6900
Print_ISBN :
0-8186-7522-5
Type :
conf
DOI :
10.1109/CSFW.1996.503703
Filename :
503703
Link To Document :
بازگشت