Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2012_5_a34, author = {A. N. Dolgikh}, title = {Mitigation methods for illegal information timing flows on the socket program interface}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {68--69}, publisher = {mathdoc}, number = {5}, year = {2012}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a34/} }
TY - JOUR AU - A. N. Dolgikh TI - Mitigation methods for illegal information timing flows on the socket program interface JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2012 SP - 68 EP - 69 IS - 5 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDMA_2012_5_a34/ LA - ru ID - PDMA_2012_5_a34 ER -
A. N. Dolgikh. Mitigation methods for illegal information timing flows on the socket program interface. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 68-69. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a34/
[1] Informatsionnaya tekhnologiya. Zaschita informatsionnykh tekhnologii i avtomatizirovannykh sistem ot ugroz informatsionnoi bezopasnosti, realizuemykh s ispolzovaniem skrytykh kanalov. Ch. 1. Obschie polozheniya, GOST R 53113-2008, Standarty, M., 2008
[2] Efstathopoulos P. O., Krohn N. O., “Labels and Event Processes in the Asbestos Operating System”, Proceedings of the SOOP' 05, ACM, 2005
[3] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio, M., 2006, 176 pp.