Modelling a Fuzzy Time System

Autor: Trostle, Jonathan T.
Zdroj: Journal of Computer Security; October 1993, Vol. 2 Issue: 4 p291-309, 19p
Abstrakt: We analyze the DEC fuzzy time technique (Hu [HU]) for both a single computer system and a network of hosts. Specifically, we investigate covert channels in a model of a fuzzy time system and in a network model of n fuzzy time hosts and one nonfuzzy time host. The fuzzy time operating system model predicts a covert channel with a datarate of roughly 50 bits per second, given a mean time between upticks of 20 milliseconds as in the VAX security kernel. We suggest several countermeasures including scheduler redesign which will close or reduce the channels that we analyze.
Databáze: Supplemental Index