Alan B. Shaffer

Learn More
Covert channels can result in unauthorized information flows when exploited by malicious software. To address this problem, we present a precise, formal definition for covert channels, which relies on control flow dependency tracing through program execution, and extends Dennings' and subsequent classic work in secure information flow [9][40][30]. A formal(More)
Evaluation of high assurance secure computer systems requires that they be designed, developed, verified and tested using rigorous processes and formal methods. The evaluation process must include correspondence between security policy objectives, security specifications, and program implementation. This research presents an approach to the verification of(More)
• The sudden injection indicator dilution method for the estimation of ventricular volumes J has been applied both in the experimental animal ~ and in man.This method presupposes effective uniform distribution of indicator in each end diastolic volume (EDV), a circumstance which may not occur. Further, it has not yet been practical to evaluate in vivo the(More)