DocumentCode :
1994998
Title :
A kind of covert channel analysis method based on trusted pipeline
Author :
Sun, Yu ; Zhang, Xing
Author_Institution :
Comput. Sci. Dept., Beijing Univ. of Technol., Beijing, China
fYear :
2011
fDate :
16-18 Sept. 2011
Firstpage :
5660
Lastpage :
5663
Abstract :
The covert channel analysis has been the focus of high level secure operating system research. Firstly, the concept and analysis methods of covert channel are described. Secondly, combined with the classic non-interference model of information flow, concept of a trusted pipeline has been applied to eliminate storage covert channel. Finally, a storage covert channel of object existence is analyzed, and the effect of trusted pipeline in eliminating the covert channel is shown.
Keywords :
operating systems (computers); security of data; covert channel analysis method; information flow security; noninterference model; operating systems; trusted pipeline; Computational modeling; Educational institutions; Operating systems; Pipelines; Privacy; Security; Software engineering; Covert Channel; Non-interference; Process; Secure Operating System;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electrical and Control Engineering (ICECE), 2011 International Conference on
Conference_Location :
Yichang
Print_ISBN :
978-1-4244-8162-0
Type :
conf
DOI :
10.1109/ICECENG.2011.6058071
Filename :
6058071
Link To Document :
بازگشت