Advertisement

Mathematical Models of the Covert Channels

  • Alexander Grusho
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2052)

Abstract

The analysis of the covert channels is necessary for construction of the protected computer systems, stenography, including methods of construction of labels for the intellectual property protection and secure labels of the copies of information objects. In some conditions it is possible to prove the invisibility by the supervising subject of the covert channel. The review of cases is given, when in some absolute sense using methods of the theory of probability and statistics it is possible to prove the “invisibility” of the covert channel by the supervising subject.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Grusho, A.: Covet Channels and Information Security in the Computer Systems. J. Discreet Mathematics (in Russian), Vol. 10(1), Moscow (1998) 3–9MathSciNetGoogle Scholar
  2. 2.
    Grusho, A.: On the existence of Covert Channels. J. Discreet Mathematics (in Russian), Vol. 11(1), Moscow (1999) 24–28MathSciNetGoogle Scholar
  3. 3.
    Grusho, A., Timonina, E.: Asymptotically Invisible Statistical Covert Channel. Revue of Applied add Industrial Mathematics (in Russian), Vol. 6(1), Moscow, TVP (1999) 135–136Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Alexander Grusho
    • 1
  1. 1.Russian State University for HumanityMoscowRussia

Personalised recommendations