| 1. | Firstmonday - covert channels in the tcp ip protocol suite -中国网络安全协会 |
| 2. | Usually , it s impossible to close up every covert channel in a system 通常,关闭系统中的每个秘密通道是不可能的。 |
| 3. | Third , an analysis model aiming at finding out potential covert channel existing in implementation model is proposed 之后,分析整个模型可能存在的隐通道,提出分析模型的设计。 |
| 4. | Through analyzing the generating condition of covert channel , this paper compares two important analysis methods of covert channel , provides better improving approach 通过分析隐通道产生条件,对两种重要的隐通道的分析方法进行了比较,提出了较为科学的改进思路。 |
| 5. | Covert channel is the key problem of the research of information flow security , so domestic and overseas scholars research the problem of information security through analyzing covert channel 隐通道是信息流安全性研究的关键问题,国内外学者通过分析隐通道对信息安全问题进行了研究。 |
| 6. | When it comes to privacy , your best strategy is to try to identify the most likely covert channels , and use them to your advantage by sending your potential attackers on a wild goose chase 对于隐私,您的最佳策略是尝试找出看起来最秘密的通道,然后通过让潜在攻击者白费力气来使用它们以获得好处。 |
| 7. | Cooking channels - from the paper how to cook a covert channel is a set of two python scripts ( cgi and client ) allowing to build a communication channel over http cookies 顾名思义,这是一种隐藏通道工具。他提供几种可行方法来实现允许在已被网络访问控制系统授权的数据流上创建并建立任意数据流传输信道。 |
| 8. | Sixth , we introduce some helpful investigations about some key technologies of high level secure operating system design , such as covert channel analysis and trusted path , and describe their coarse - gained implementation in the real system 第六,对高等级安全操作系统设计的其它几个关键问题,包括隐蔽通道分析处理、可信路径等做了有益的探索,给出了其在系统中实现的大致方案。 |
| 9. | Forth , depending on a limited syntax language , a research on the method and process of the semi - formal specification of the top level function is developed . this top level specification paves the way for the system verification and the covert channel analysis 第四,借助一种受限的句法语言,研究了对系统顶层功能进行半形式化规范的方法和过程,而顶层功能规范则为系统验证、隐蔽通道分析等后继工作奠定了基础。 |