| Computers - 1994 - 304 pages
...subjects at different security levels. Covert timing channel — a covert channel in which one process signals information to another by modulating its own...real response time observed by the second process. - D Data confidentiality — the state that exists when data is held in confidence and is protected... | |
| Electronic data processing documentation - 1988 - 44 pages
...subjects at different security levels.[5] Covert Timing Channel A covert channel in which one process signals information to another by modulating its own...real response time observed by the second process. [5] Descriptive TOR. Level Specification (DTLS) A top level specification that is written in a natural... | |
| 1995 - 44 pages
...subjects at different security levels.[5] Covert Timing Channel A covert channel in which one process signals information to another by modulating its own...real response time observed by the second process. [5] Descriptive Top.Level Specification (DTLS) A top level specification that is written in a natural... | |
| Electronic data processing departments - 1990 - 64 pages
...subjects at different security levels. Covert Timing Channel A covert channel in which one process signals information to another by modulating its own...real response time observed by the second process. Coverage Analysis Qualitative or quantitative assessment of the extent to which the test conditions... | |
| Computer security - 1989 - 68 pages
...subjects at different security levels. covert timing channel A covert channel in which one process signals information to another by modulating its own...real response time observed by the second process. Criteria See DoD Trusted Computer System Evaluation Criteria. crypto-algorithm A well-defined procedure... | |
| 1993 - 176 pages
...storage location by another process. [NCSC87] Covert Timing Channel A covert channel in which one process signals information to another by modulating its own...real response time observed by the second process. [NCSC87] Denial of Service Any action or series of actions that prevent any part of a system from functioning... | |
| Computer security - 1993 - 162 pages
...subjects at different security levels. Covert Timing Channel - A covert channel in which one process signals information to another by modulating its own...real response time observed by the second process. Data Integrity - The state that exists when computerized data is the same as that in the source documents... | |
| DIANE Publishing Company - 1994 - 126 pages
...subjects at different security levels. Covert Timing Channel A covert channel in which one process signals information to another by modulating its own...real response time observed by the second process. GLOSSARY Coverage Analysis Qualitative or quantitative assessment of the extent to which the test conditions... | |
| Joan Fowler - 1994 - 163 pages
...subjects at different security levels. Covert Timing Channel - A covert channel in which one process signals information to another by modulating its own...real response time observed by the second process. Data Integrity - The state that exists when computerized data is the same as that in the source documents... | |
| |