Filters








2,905 Hits in 8.7 sec

Establishing Multi-level Security in Mobile Data Access

Muhammad Mukaram Khan, Constantinos Papadopoulos
2007 The Open Information Systems Journal  
In this paper, we first investigate to what degree this breach may occur and we also assess the suitability of existing protocols for avoiding the appearance of covert channels in mobile database access  ...  compromising their consistency or the atomicity of transactions.  ...  and ensure the security of mobile transactions by eliminating any chances of timing and motion covert channels.  ... 
doi:10.2174/187413390701011909 fatcat:pafaz6yskfcxpmf7x47atbfwfm

Establishing Multi-level Security in Mobile Data Access

Muhammad Mukaram Khan, Constantinos Papadopoulos
2007 The Open Information Systems Journal  
In this paper, we first investigate to what degree this breach may occur and we also assess the suitability of existing protocols for avoiding the appearance of covert channels in mobile database access  ...  compromising their consistency or the atomicity of transactions.  ...  and ensure the security of mobile transactions by eliminating any chances of timing and motion covert channels.  ... 
doi:10.2174/1874133900701010019 fatcat:hbvuvy2bmzfojg5ionsc6xmfze

Concurrency Control for Multilevel Secure Databases

Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje
2009 International Journal of Network Security  
The concurrency control requirements for transaction processing in multilevel secure database management systems (MLS/DBMSs) are different from those in conventional transaction processing systems.  ...  In MLS/DBMSs, coordination of transactions at different security levels is needed to avoid both covert channels and the starvation of high security level transactions.  ...  Hence, timing covert channels arising from synchronization are eliminated.  ... 
dblp:journals/ijnsec/KaurSMS09 fatcat:ejaivhtckzgptcyxa73samowlq

The Applications of Blockchain in the Covert Communication

Bangyao Du, Debiao He, Min Luo, Cong Peng, Qi Feng
2022 Wireless Communications and Mobile Computing  
In this paper, based on the analysis of the literature and the classification according to the hiding position, we identify four kinds of covert communication: Address Channel, Value Channel, DSA (Digital  ...  In recent years, there have been attempts to apply the blockchain to covert communication solutions, for the characteristics of blockchain such as decentralization, openness, and trustworthiness.  ...  As a data structure, blockchain consists of many blocks linked in the order of time from back to front which contain transactions submitted to it.  ... 
doi:10.1155/2022/4618007 doaj:20717cd0af51452b83b4083067f495b8 fatcat:6ytdnpz3wvdr7fgocxdtvwvzyu

Priority-driven secure multiversion locking protocol for real-time secure database systems [chapter]

C. Park, S. Park, S. Son
1998 IFIP Advances in Information and Communication Technology  
Database systems for real-time applications must satisfy timing constraints associated with transactions.  ...  In this paper, we propose a new priority-driven secure multiversion locking protocol for real-time secure database systems.  ...  Acknowledgement This research was supported by Institute of Information Technology Assessment of Korea.  ... 
doi:10.1007/978-0-387-35285-5_14 fatcat:aldkpjcqybcp7kzrq3wyhjvwaq

Secure transaction processing in firm real-time database systems

Binto George, Jayant Haritsa
1997 Proceedings of the 1997 ACM SIGMOD international conference on Management of data - SIGMOD '97  
We investigate here the 1"" ~HXIMI~Y uuplications, in terms of missed deadlines, of g:l~;mt,~&g sec,urity in a real-time database system.  ...  \vllic.ll i~uluug t,ht: previously proposed real-time concur-KI'~~('v (control l)rot,ocols a.re capable of providing protection ,I~:.IIII>I IHJI II tll1,cnc.l and mdirect, (covert. channels) means of tltl  ...  Our simulation model captures a real-time database system with an open transaction arrival process.  ... 
doi:10.1145/253260.253362 dblp:conf/sigmod/GeorgeH97 fatcat:3oeqenfrr5bejf73wua5ddryne

Misconceptions about real-time databases

J.A. Stankovic, Sang Hyuk Son, J. Hansson
1999 Computer  
In a real-time database system, timing constraints are associated with transactions, and data are valid for specific time intervals. 2, 3 The transaction timing constraints can be completion deadlines,  ...  For example, if a transaction uses temperature and pressure data to make a decision regarding a chemical process, these two data values must correlate closely in time or the computation will likely make  ...  Frequently, priority inversion is necessary to avoid covert channels (hidden timing channels), which must not exist in secure systems.  ... 
doi:10.1109/2.769440 fatcat:fgewots6vve5lhsvjqb55xcoxm

Covert channels in TCP/IP protocol stack - extended version-

Aleksandra Mileva, Boris Panajotov
2014 Open Computer Science  
For most of the covert channels its data bandwidth is given.  ...  AbstractWe give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol.  ...  A covert channel (first introduced by Lampson [1] ), on the other hand, is any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security  ... 
doi:10.2478/s13537-014-0205-6 fatcat:tkkyehibpbf3tl5x5bctsqkk6y

Covert communications through network configuration messages

Ruben Rios, Jose A. Onieva, Javier Lopez
2013 Computers & security  
Covert channels are a form of hidden communication that may violate the integrity of systems.  ...  Since their birth in Multi-Level Security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications  ...  The SPRINT project is co-financed by FEDER (European Regional Development Fund) and the first author is supported by the Spanish Ministry of Education through the National F.P.U. Program.  ... 
doi:10.1016/j.cose.2013.03.004 fatcat:a5fsks3a35fd7pjo6icuyjwa6y

Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud

Zhenyu Wu, Zhang Xu, Haining Wang
2015 IEEE/ACM Transactions on Networking  
Our experimental results show that covert channels do pose serious threats to information security in the cloud.  ...  We first study the application of existing cache channel techniques in a virtualized environment, and uncover their major insufficiency and difficulties.  ...  Because normal applications would rarely generate such an intense memory workload for an extended period of time, the memory bus covert channel is still practical in the real world. B.  ... 
doi:10.1109/tnet.2014.2304439 fatcat:sj23ezf3nvbgnja5drpenl3zzi

Behavioral Mimicry Covert Communication [chapter]

Seyed Ali Ahmadzadeh, Gordon Agnew
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
On the other hand, from a secure system design point of view, identification of covert channels is equally important in order to prevent information leakage from high priority level processes to the lower  ...  Another formulation for the capacity of timing covert channels and its application on limiting covert channels is studied in [24] .  ... 
doi:10.1007/978-3-642-31909-9_8 fatcat:uz5vx5lvzvh2vfqmcpnk2gnqza

Critical system properties: survey and taxonomy

John Rushby
1994 Reliability Engineering & System Safety  
Yet another tradition is found in the security community, and there are further specialized approaches in the tradition of real-time systems.  ...  or conflict with those of another, and in whether certain critical system properties are fundamentally compatible or incompatible with each other.  ...  Tom Anderson (University of Newcastle) and Bev Littlewood (City University) provided helpful comments on an earlier version that I have tried to address in this one.  ... 
doi:10.1016/0951-8320(94)90065-5 fatcat:ksvm6ppdyvht3pkb3k5oqjkwg4

A Guide to Understanding Design Documentation in Trusted Systems [chapter]

1985 The 'Orange Book' Series  
Acknowledgment is also given to all those members of the computer security community who contributed their time and expertise by actively participating in the review of this document.  ...  known covert timing channels.  ...  At TCSEC class B3, the design documentation shall recognize the introduction of covert timing channels into the requirements and shall consider them in all covert channel related descriptions as stated  ... 
doi:10.1007/978-1-349-12020-8_12 fatcat:bj5c6qvygba57cwhhnaxim4qq4

Addressing covert termination and timing channels in concurrent information flow systems

Deian Stefan, Alejandro Russo, Pablo Buiras, Amit Levy, John C. Mitchell, David Maziéres
2012 Proceedings of the 17th ACM SIGPLAN international conference on Functional programming - ICFP '12  
While this termination covert channel has limited bandwidth for sequential programs, it is a more dangerous source of information leakage in concurrent settings.  ...  We address concurrent termination and timing channels by presenting a dynamic information-flow control system that mitigates and eliminates these channels while allowing termination and timing to depend  ...  Acknowledgments We thank the anonymous reviewers for insightful comments and bringing several references to our attention.  ... 
doi:10.1145/2364527.2364557 dblp:conf/icfp/StefanRBLMM12 fatcat:otvnjixvrbb2pcy2hh7uogyz5i

Addressing covert termination and timing channels in concurrent information flow systems

Deian Stefan, Alejandro Russo, Pablo Buiras, Amit Levy, John C. Mitchell, David Maziéres
2012 SIGPLAN notices  
While this termination covert channel has limited bandwidth for sequential programs, it is a more dangerous source of information leakage in concurrent settings.  ...  We address concurrent termination and timing channels by presenting a dynamic information-flow control system that mitigates and eliminates these channels while allowing termination and timing to depend  ...  Acknowledgments We thank the anonymous reviewers for insightful comments and bringing several references to our attention.  ... 
doi:10.1145/2398856.2364557 fatcat:ly7feqduejbz7hpi7xx6fr5cg4
« Previous Showing results 1 — 15 out of 2,905 results