ISCTCS 2012: Trustworthy Computing and Services pp 26-33 | Cite as
Research on Identifying Method of Covert Channels in Database System
Conference paper
Abstract
At present, the security level of DBMS in our country fails to satisfy the need of development and it’s an urgent task to improve the safety performance of the relational database systems. The analysis and research on covert channels are vital to raising the security level of DBMS in our county. In this paper, we study the identifying method of covert channels in database system and propose a more efficient, more authentic and safely isolated identifying method of covert channels, which contributes to the follow-up process.
Keywords
database system covert channel identifying methodPreview
Unable to display preview. Download preview PDF.
References
- 1.G A/T 389-2002. Database management system technology requirement in computer information system classified security protection Google Scholar
- 2.Li, D.-F., Xie, X.: The Research and Realization of Database security Technology 1, 1–2 (2008)Google Scholar
- 3.Liang, T.: Search of Security Evaluation Criteria. Mini-micro Systems 27(4), 2 (2006)Google Scholar
- 4.Computer system security standards. High Performance Computer Technology 06, 61–62 (2001)Google Scholar
- 5.Dept.of Defence. Trusted Database Management System Interpretation. National Computer Security Center, 12 (1985) Google Scholar
- 6.Binge, C.: Using an Information Flow Graph to Identify and Analyze Covert Channels. Journal of Harbin Engineering University 05, 742–744 (2006)Google Scholar
- 7.Denning, D.E.: A Lattice Model of Secure Information Flow. Communications of the ACM 19(5), 236–243 (1976)MathSciNetMATHCrossRefGoogle Scholar
- 8.Filsinger, J.: Integrity and the audit of trusted database management systems. IFIP Transactions A: Computer Science and Technology A21, 349–365 (1993)Google Scholar
- 9.Le, Z., Fu, P.: Security Mechanisms and Implementation of Class-B1 Networks. Computer Engineering and Applications 18, 54–56 (2001)Google Scholar
- 10.
- 11.Kemmerer, R.A.: Shared resource matrix methodology: A practical approach to identifying covert channels. ACM Transactions on Computer Systems (1983)Google Scholar
- 12.Ju, S., Song, X.: On the Formal Characterization of Covert Channel. In: Chi, C.-H., Lam, K.-Y. (eds.) AWCC 2004. LNCS, vol. 3309, pp. 155–160. Springer, Heidelberg (2004)CrossRefGoogle Scholar
- 13.Kemmerer, R.A.: Shared Resource Matrix Methodology: A Practical Approach to Identifying Covert Channels. ACM Transactions on Computer Systems 1(3), 256–277 (1983)CrossRefGoogle Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2013