DocumentCode
1994998
Title
A kind of covert channel analysis method based on trusted pipeline
Author
Sun, Yu ; Zhang, Xing
Author_Institution
Comput. Sci. Dept., Beijing Univ. of Technol., Beijing, China
fYear
2011
fDate
16-18 Sept. 2011
Firstpage
5660
Lastpage
5663
Abstract
The covert channel analysis has been the focus of high level secure operating system research. Firstly, the concept and analysis methods of covert channel are described. Secondly, combined with the classic non-interference model of information flow, concept of a trusted pipeline has been applied to eliminate storage covert channel. Finally, a storage covert channel of object existence is analyzed, and the effect of trusted pipeline in eliminating the covert channel is shown.
Keywords
operating systems (computers); security of data; covert channel analysis method; information flow security; noninterference model; operating systems; trusted pipeline; Computational modeling; Educational institutions; Operating systems; Pipelines; Privacy; Security; Software engineering; Covert Channel; Non-interference; Process; Secure Operating System;
fLanguage
English
Publisher
ieee
Conference_Titel
Electrical and Control Engineering (ICECE), 2011 International Conference on
Conference_Location
Yichang
Print_ISBN
978-1-4244-8162-0
Type
conf
DOI
10.1109/ICECENG.2011.6058071
Filename
6058071
Link To Document