Author:
Jaskolka Jason,Khedri Ridha,Sabri Khair Eddin
Publisher
Springer Science and Business Media LLC
Reference55 articles.
1. Andrews GR, Reitman RP (1980) An axiomatic approach to information flow in programs. ACM Trans Program Lang Syst 2(1):56–76
2. Deavours CA, Kruh L (1990) The turing bombe: was it enough? Cryptologia 14(4):331–349
3. Emulex Corporation (2013) EndaceProbe INR specifications. http://www.emulex.com/products/network-visibility-products-and-services/endaceprobe-intelligent-network-recorders/specifications/ . Accessed 23 May 2014
4. Goguen JA, Meseguer J (1982) Security policies and security models. In: Proceedings of the 1982 symposium on security and privacy, New York, pp 11–20
5. Gray III JW (2000) Countermeasures and tradeoffs for a class of covert timing channels. Technical Report HKUST-CS94-18, Hong Kong University of Science and Technology
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献