{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:06:09Z","timestamp":1725566769452},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290018"},{"type":"electronic","value":"9783540319306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11556992_37","type":"book-chapter","created":{"date-parts":[[2010,9,28]],"date-time":"2010-09-28T04:05:31Z","timestamp":1285646731000},"page":"498-505","source":"Crossref","is-referenced-by-count":19,"title":["New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation"],"prefix":"10.1007","author":[{"given":"Zhenghong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ruby B.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"37_CR1","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/357369.357374","volume":"1","author":"R.A. Kemmerer","year":"1983","unstructured":"Kemmerer, R.A.: Shared Resource Matrix Methodology: An Approach to Identifying storage and Timing Channels. ACM Transactions on Computer Systems\u00a01(3), 256\u2013277 (1983)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"10","key":"37_CR2","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B.W. Lampson","year":"1973","unstructured":"Lampson, B.W.: A Note on the Confinement Problem. Communications of the ACM\u00a016(10), 613\u2013615 (1973)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Millen, J.: 20 Years of Covert Channel Modeling and Analysis. In: Proceedings of the IEEE Symposium on Security and Privacy, May 1999, pp. 113\u2013114 (1999)","key":"37_CR3","DOI":"10.1109\/SECPRI.1999.766906"},{"unstructured":"National Computer Security Center, A Guide to Understanding Covert Channel Analysis of Trusted Systems, NCSC-TG-30 (November 1993), Available at http:\/\/www.radium.ncsc.mil\/tpep\/library\/rainbow\/","key":"37_CR4"},{"unstructured":"McHugh, J.: Covert Channel Analysis: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems (December 1995), Available at http:\/\/chacs.nrl.navy.mil\/publications\/handbook\/","key":"37_CR5"},{"doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security Policies and Security Models. In: Proceedings of the IEEE Symposium on Security and Privacy, April 1982, pp. 11\u201320 (1982)","key":"37_CR6","DOI":"10.1109\/SP.1982.10014"},{"issue":"2","key":"37_CR7","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TSE.1987.226479","volume":"13","author":"J.T. Haigh","year":"1987","unstructured":"Haigh, J.T., Kemmerer, R.A., McHugh, J., Young, W.D.: An Experience of Using Two Covert Channel Analysis Techniques. IEEE Trans. on Software Engineering\u00a013(2), 157\u2013168 (1987)","journal-title":"IEEE Trans. on Software Engineering"},{"doi-asserted-by":"crossref","unstructured":"Millen, J.K.: Covert Channel Capacity. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, April 1987, pp. 60\u201366 (1987)","key":"37_CR8","DOI":"10.1109\/SP.1987.10013"},{"doi-asserted-by":"crossref","unstructured":"Moskowitz, I.S., Miller, A.R.: Simple Timing Channels. In: Proceedings of IEEE Computer Symposium on Research in Security and Privacy, May 1994, pp. 56\u201364 (1994)","key":"37_CR9","DOI":"10.1109\/RISP.1994.296592"},{"doi-asserted-by":"crossref","unstructured":"Moskowitz, I.S., Greenwald, S.J., Kang, M.H.: An Analysis of the Timed-Z Channel. In: Proceedings of IEEE Computer Symposium on Security and Privacy, May 1996, pp. 2\u201311 (1996)","key":"37_CR10","DOI":"10.1109\/SECPRI.1996.502664"},{"issue":"2","key":"37_CR11","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1109\/18.910582","volume":"47","author":"M.C. Davey","year":"2001","unstructured":"Davey, M.C., Mackey, D.J.C.: Reliable Communication over Channels with Insertions, Deletions, and Substitutions. IEEE Trans. on Information Theory\u00a047(2), 687\u2013698 (2001)","journal-title":"IEEE Trans. on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"Millen, J.K.: Finite-State Noiseless Covert Channels. In: Proceedings of the Computer Security Foundations Workshop II, June 1989, pp. 81\u201386 (1989)","key":"37_CR12","DOI":"10.1109\/CSFW.1989.40590"},{"doi-asserted-by":"crossref","unstructured":"Wray, J.C.: An analysis of covert timing channels. In: Proceedings of IEEE Computer Symposium on Research in Security and Privacy, May 1991, pp. 2\u20137 (1991)","key":"37_CR13","DOI":"10.1109\/RISP.1991.130767"},{"unstructured":"Wang, Z., Lee, R.: Separating data and signaling channels in modeling covert channels. Princeton University Department of Electrical Engineering Technical Report CE-L2004-003 (November 2004)","key":"37_CR14"},{"unstructured":"Wang, Z., Lee, R.B.: Capacity Estimation of Non-Synchronous Covert Channels. In: Proceedings of the 2nd International Workshop on Security in Distributed Computing Systems (June 2005)","key":"37_CR15"},{"doi-asserted-by":"crossref","unstructured":"Wang, Z., Lee, R.B.: New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation (full paper). Princeton University Department of Electrical Engineering Technical Report CE-L2005-004 (April 2005)","key":"37_CR16","DOI":"10.1007\/11556992_37"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11556992_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:48:06Z","timestamp":1605642486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11556992_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290018","9783540319306"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11556992_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}