Author:
Jaskolka Jason,Khedri Ridha,Zhang Qinglei
Reference20 articles.
1. B. Lampson, A note on the confinement problem, Communications of the ACM 16 (10) (1973) 613-615.
2. U.S.A. Department of Defense, Trusted Computer System Evaluation Criteria (TCSEC), no. DoD 5200.28-STD in Defense Department Rainbow Series (Orange Book), Department of Defense/National Computer Security Center, Fort George G. Meade, MD, USA, 1985.
3. S. Zander, G. Armitage, P. Branch, A survey of covert channels and countermeasures in computer network protocols, IEEE Communications Surveys Tutorials 9 (3) (2007) 44-57.
4. H. Tipton, M. Krause, Information Security Management Handbook, Vol. 2, Auerbach, 2008.
5. C. Probst, J. Hunker, D. Gollmann, M. Bishop, Insider Threats In Cyber Security, Vol. 49 of Advances In Information Security, Springer, 2010.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献