Learn More
Techniques for detecting covert channels are based on information flow models. This paper establishes a connection between Shannon's theory of communication and information flow models, such as the(More)
Covert channels in a multilevel secure computer system can be exploited by malicious software to compromise information. The maximum information rate of a known channel is determined by modeling the(More)