Computer Science ›› 2007, Vol. 34 ›› Issue (10): 92-95.
Previous Articles Next Articles
Online:
Published:
Abstract: Some covert information flow evades the inspection of security mechanism in trusted computer system, which results in information leakage. The atomic channel model was established by analyzing and abstracting the principle of covert information flow. A fi
Key words: Covert channel, Information security, Security model
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I10/92
Cited