Hidden channels and information security in computer systems
Diskretnaya Matematika, Tome 10 (1998) no. 1, pp. 3-9.

Voir la notice de l'article provenant de la source Math-Net.Ru

While constructing information security systems, one should allow for existence of the so-called Troyan horses and other hidden holes to attack. In this paper, we model such a situation on the base of a pair of automata, legal and illegal. which are controlled by a common input. We give a definition of a subliminal illegal control channel. Existence conditions and examples of subliminal channels are given.This research was supported by the Russian Foundation for Basic Research, grant 97–01–00162.
@article{DM_1998_10_1_a0,
     author = {A. A. Grusho},
     title = {Hidden channels and information security in computer systems},
     journal = {Diskretnaya Matematika},
     pages = {3--9},
     publisher = {mathdoc},
     volume = {10},
     number = {1},
     year = {1998},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/DM_1998_10_1_a0/}
}
TY  - JOUR
AU  - A. A. Grusho
TI  - Hidden channels and information security in computer systems
JO  - Diskretnaya Matematika
PY  - 1998
SP  - 3
EP  - 9
VL  - 10
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/DM_1998_10_1_a0/
LA  - ru
ID  - DM_1998_10_1_a0
ER  - 
%0 Journal Article
%A A. A. Grusho
%T Hidden channels and information security in computer systems
%J Diskretnaya Matematika
%D 1998
%P 3-9
%V 10
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/DM_1998_10_1_a0/
%G ru
%F DM_1998_10_1_a0
A. A. Grusho. Hidden channels and information security in computer systems. Diskretnaya Matematika, Tome 10 (1998) no. 1, pp. 3-9. http://geodesic.mathdoc.fr/item/DM_1998_10_1_a0/