The analysis of the covert channels is necessary for construction of the protected computer systems, stenography, including methods of construction of labels for the intellectual property protection and secure labels of the copies of information objects. In some conditions it is possible to prove the invisibility by the supervising subject of the covert channel. The review of cases is given, when in some absolute sense using methods of the theory of probability and statistics it is possible to prove the “invisibility” of the covert channel by the supervising subject.
CITATION STYLE
Grusho, A. (2001). Mathematical models of the covert channels. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2052, pp. 15–20). Springer Verlag. https://doi.org/10.1007/3-540-45116-1_2
Mendeley helps you to discover research relevant for your work.