Several types of statistical covert channels that break the informational system security policy ensuring a reliable information transfer between hostile agents can be detected by a competent warden. We introduce1 the basic detection technique and analyze the conditions under which the warden with limited resources can perform his task successfully. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Grusho, A., Kniazev, A., & Timonina, E. (2005). Detection of illegal information flow. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3685 LNCS, pp. 235–244). https://doi.org/10.1007/11560326_18
Mendeley helps you to discover research relevant for your work.