Author:
Wu Jingzheng,Wang Yongji,Ding Liping,Liao Xiaofeng
Funder
863 project
Knowledge Innovation Key Directional Program of Chinese Academy of Sciences
Chinese Academy of Sciences Institute of Software Special Programs and Long-term Development Project
Subject
Computer Science Applications,Modeling and Simulation
Reference26 articles.
1. NCSC, Trusted computer system evaluation criteria (orange book) 1985.
2. A note on the confinement problem;Lampson;Communications of the ACM,1973
3. Covert channels in LAN’s;Girling;IEEE Transactions on Software Engineering,1987
4. T.G. Handel, M.T. Sandford II, Hiding data in the OSI network model, in: Information Hiding, 1996, pp. 23–38.
5. C. Rowland, Covert channels in the TCP/IP protocol suite, First Monday, 2 (5–5).
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献