1. Beauquier, D., Lanotte, R., 2007. Hiding information in multi level security systems. LNCS, 4691:250–269. [doi:10.1007/978-3-540-75227-1_17]
2. Costich, O., Moskowitz, I., 1991. Analysis of a Storage Channel in the Two Phase Commit Protocol. Proc. Computer Security Foundations Workshop IV, p.201–208. [doi:10.1109/CSFW.1991.151587]
3. DoD STD-5200.28, 1985. Trusted Computer System Evaluation Criteria. National Computer Security Center, USA.
4. Fisk, G., Fisk, M., Papadopoulos, C., Neil, J., 2002. Eliminating steganography in Internet traffic with active wardens. LNCS, 2578:18–35. [doi:10.1007/3-540-36415-3_2]
5. Huskamp, J.C., 1978. Covert Communication Channels in Timesharing Systems. Technical Report UCB-CS-78-02.