A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Establishing Multi-level Security in Mobile Data Access
2007
The Open Information Systems Journal
In this paper, we first investigate to what degree this breach may occur and we also assess the suitability of existing protocols for avoiding the appearance of covert channels in mobile database access ...
compromising their consistency or the atomicity of transactions. ...
and ensure the security of mobile transactions by eliminating any chances of timing and motion covert channels. ...
doi:10.2174/187413390701011909
fatcat:pafaz6yskfcxpmf7x47atbfwfm
Establishing Multi-level Security in Mobile Data Access
2007
The Open Information Systems Journal
In this paper, we first investigate to what degree this breach may occur and we also assess the suitability of existing protocols for avoiding the appearance of covert channels in mobile database access ...
compromising their consistency or the atomicity of transactions. ...
and ensure the security of mobile transactions by eliminating any chances of timing and motion covert channels. ...
doi:10.2174/1874133900701010019
fatcat:hbvuvy2bmzfojg5ionsc6xmfze
Concurrency Control for Multilevel Secure Databases
2009
International Journal of Network Security
The concurrency control requirements for transaction processing in multilevel secure database management systems (MLS/DBMSs) are different from those in conventional transaction processing systems. ...
In MLS/DBMSs, coordination of transactions at different security levels is needed to avoid both covert channels and the starvation of high security level transactions. ...
Hence, timing covert channels arising from synchronization are eliminated. ...
dblp:journals/ijnsec/KaurSMS09
fatcat:ejaivhtckzgptcyxa73samowlq
The Applications of Blockchain in the Covert Communication
2022
Wireless Communications and Mobile Computing
In this paper, based on the analysis of the literature and the classification according to the hiding position, we identify four kinds of covert communication: Address Channel, Value Channel, DSA (Digital ...
In recent years, there have been attempts to apply the blockchain to covert communication solutions, for the characteristics of blockchain such as decentralization, openness, and trustworthiness. ...
As a data structure, blockchain consists of many blocks linked in the order of time from back to front which contain transactions submitted to it. ...
doi:10.1155/2022/4618007
doaj:20717cd0af51452b83b4083067f495b8
fatcat:6ytdnpz3wvdr7fgocxdtvwvzyu
Priority-driven secure multiversion locking protocol for real-time secure database systems
[chapter]
1998
IFIP Advances in Information and Communication Technology
Database systems for real-time applications must satisfy timing constraints associated with transactions. ...
In this paper, we propose a new priority-driven secure multiversion locking protocol for real-time secure database systems. ...
Acknowledgement This research was supported by Institute of Information Technology Assessment of Korea. ...
doi:10.1007/978-0-387-35285-5_14
fatcat:aldkpjcqybcp7kzrq3wyhjvwaq
Secure transaction processing in firm real-time database systems
1997
Proceedings of the 1997 ACM SIGMOD international conference on Management of data - SIGMOD '97
We investigate here the 1"" ~HXIMI~Y uuplications, in terms of missed deadlines, of g:l~;mt,~&g sec,urity in a real-time database system. ...
\vllic.ll i~uluug t,ht: previously proposed real-time concur-KI'~~('v (control l)rot,ocols a.re capable of providing protection ,I~:.IIII>I IHJI II tll1,cnc.l and mdirect, (covert. channels) means of tltl ...
Our simulation model captures a real-time database system with an open transaction arrival process. ...
doi:10.1145/253260.253362
dblp:conf/sigmod/GeorgeH97
fatcat:3oeqenfrr5bejf73wua5ddryne
Misconceptions about real-time databases
1999
Computer
In a real-time database system, timing constraints are associated with transactions, and data are valid for specific time intervals. 2, 3 The transaction timing constraints can be completion deadlines, ...
For example, if a transaction uses temperature and pressure data to make a decision regarding a chemical process, these two data values must correlate closely in time or the computation will likely make ...
Frequently, priority inversion is necessary to avoid covert channels (hidden timing channels), which must not exist in secure systems. ...
doi:10.1109/2.769440
fatcat:fgewots6vve5lhsvjqb55xcoxm
Covert channels in TCP/IP protocol stack - extended version-
2014
Open Computer Science
For most of the covert channels its data bandwidth is given. ...
AbstractWe give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. ...
A covert channel (first introduced by Lampson [1] ), on the other hand, is any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security ...
doi:10.2478/s13537-014-0205-6
fatcat:tkkyehibpbf3tl5x5bctsqkk6y
Covert communications through network configuration messages
2013
Computers & security
Covert channels are a form of hidden communication that may violate the integrity of systems. ...
Since their birth in Multi-Level Security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications ...
The SPRINT project is co-financed by FEDER (European Regional Development Fund) and the first author is supported by the Spanish Ministry of Education through the National F.P.U. Program. ...
doi:10.1016/j.cose.2013.03.004
fatcat:a5fsks3a35fd7pjo6icuyjwa6y
Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud
2015
IEEE/ACM Transactions on Networking
Our experimental results show that covert channels do pose serious threats to information security in the cloud. ...
We first study the application of existing cache channel techniques in a virtualized environment, and uncover their major insufficiency and difficulties. ...
Because normal applications would rarely generate such an intense memory workload for an extended period of time, the memory bus covert channel is still practical in the real world.
B. ...
doi:10.1109/tnet.2014.2304439
fatcat:sj23ezf3nvbgnja5drpenl3zzi
Behavioral Mimicry Covert Communication
[chapter]
2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
On the other hand, from a secure system design point of view, identification of covert channels is equally important in order to prevent information leakage from high priority level processes to the lower ...
Another formulation for the capacity of timing covert channels and its application on limiting covert channels is studied in [24] . ...
doi:10.1007/978-3-642-31909-9_8
fatcat:uz5vx5lvzvh2vfqmcpnk2gnqza
Critical system properties: survey and taxonomy
1994
Reliability Engineering & System Safety
Yet another tradition is found in the security community, and there are further specialized approaches in the tradition of real-time systems. ...
or conflict with those of another, and in whether certain critical system properties are fundamentally compatible or incompatible with each other. ...
Tom Anderson (University of Newcastle) and Bev Littlewood (City University) provided helpful comments on an earlier version that I have tried to address in this one. ...
doi:10.1016/0951-8320(94)90065-5
fatcat:ksvm6ppdyvht3pkb3k5oqjkwg4
A Guide to Understanding Design Documentation in Trusted Systems
[chapter]
1985
The 'Orange Book' Series
Acknowledgment is also given to all those members of the computer security community who contributed their time and expertise by actively participating in the review of this document. ...
known covert timing channels. ...
At TCSEC class B3, the design documentation shall recognize the introduction of covert timing channels into the requirements and shall consider them in all covert channel related descriptions as stated ...
doi:10.1007/978-1-349-12020-8_12
fatcat:bj5c6qvygba57cwhhnaxim4qq4
Addressing covert termination and timing channels in concurrent information flow systems
2012
Proceedings of the 17th ACM SIGPLAN international conference on Functional programming - ICFP '12
While this termination covert channel has limited bandwidth for sequential programs, it is a more dangerous source of information leakage in concurrent settings. ...
We address concurrent termination and timing channels by presenting a dynamic information-flow control system that mitigates and eliminates these channels while allowing termination and timing to depend ...
Acknowledgments We thank the anonymous reviewers for insightful comments and bringing several references to our attention. ...
doi:10.1145/2364527.2364557
dblp:conf/icfp/StefanRBLMM12
fatcat:otvnjixvrbb2pcy2hh7uogyz5i
Addressing covert termination and timing channels in concurrent information flow systems
2012
SIGPLAN notices
While this termination covert channel has limited bandwidth for sequential programs, it is a more dangerous source of information leakage in concurrent settings. ...
We address concurrent termination and timing channels by presenting a dynamic information-flow control system that mitigates and eliminates these channels while allowing termination and timing to depend ...
Acknowledgments We thank the anonymous reviewers for insightful comments and bringing several references to our attention. ...
doi:10.1145/2398856.2364557
fatcat:ly7feqduejbz7hpi7xx6fr5cg4
« Previous
Showing results 1 — 15 out of 2,905 results