Detection of illegal information flow

8Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Several types of statistical covert channels that break the informational system security policy ensuring a reliable information transfer between hostile agents can be detected by a competent warden. We introduce1 the basic detection technique and analyze the conditions under which the warden with limited resources can perform his task successfully. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Grusho, A., Kniazev, A., & Timonina, E. (2005). Detection of illegal information flow. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3685 LNCS, pp. 235–244). https://doi.org/10.1007/11560326_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free