Mathematical models of the covert channels

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The analysis of the covert channels is necessary for construction of the protected computer systems, stenography, including methods of construction of labels for the intellectual property protection and secure labels of the copies of information objects. In some conditions it is possible to prove the invisibility by the supervising subject of the covert channel. The review of cases is given, when in some absolute sense using methods of the theory of probability and statistics it is possible to prove the “invisibility” of the covert channel by the supervising subject.

Cite

CITATION STYLE

APA

Grusho, A. (2001). Mathematical models of the covert channels. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2052, pp. 15–20). Springer Verlag. https://doi.org/10.1007/3-540-45116-1_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free