Mitigation methods for illegal information timing flows on the socket program interface
Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 68-69.

Voir la notice de l'article provenant de la source Math-Net.Ru

Some ways for creating and implementing information timing flows based on sockets in GNU/Linux operating system are considered. Methods for mitigating them based on the subjects blocking accesses are proposed.
@article{PDMA_2012_5_a34,
     author = {A. N. Dolgikh},
     title = {Mitigation methods for illegal information timing flows on the socket program interface},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {68--69},
     publisher = {mathdoc},
     number = {5},
     year = {2012},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a34/}
}
TY  - JOUR
AU  - A. N. Dolgikh
TI  - Mitigation methods for illegal information timing flows on the socket program interface
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2012
SP  - 68
EP  - 69
IS  - 5
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2012_5_a34/
LA  - ru
ID  - PDMA_2012_5_a34
ER  - 
%0 Journal Article
%A A. N. Dolgikh
%T Mitigation methods for illegal information timing flows on the socket program interface
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2012
%P 68-69
%N 5
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2012_5_a34/
%G ru
%F PDMA_2012_5_a34
A. N. Dolgikh. Mitigation methods for illegal information timing flows on the socket program interface. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 68-69. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a34/

[1] Informatsionnaya tekhnologiya. Zaschita informatsionnykh tekhnologii i avtomatizirovannykh sistem ot ugroz informatsionnoi bezopasnosti, realizuemykh s ispolzovaniem skrytykh kanalov. Ch. 1. Obschie polozheniya, GOST R 53113-2008, Standarty, M., 2008

[2] Efstathopoulos P. O., Krohn N. O., “Labels and Event Processes in the Asbestos Operating System”, Proceedings of the SOOP' 05, ACM, 2005

[3] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio, M., 2006, 176 pp.