|
Prikladnaya Diskretnaya Matematika. Supplement, 2012, Issue 5, Pages 68–69
(Mi pdma11)
|
|
|
|
Mathematical Foundations of Computer Security
Mitigation methods for illegal information timing flows on the socket program interface
A. N. Dolgikh Tomsk State University, Tomsk
Abstract:
Some ways for creating and implementing information timing flows based on sockets in GNU/Linux operating system are considered. Methods for mitigating them based on the subjects blocking accesses are proposed.
Citation:
A. N. Dolgikh, “Mitigation methods for illegal information timing flows on the socket program interface”, Prikl. Diskr. Mat. Suppl., 2012, no. 5, 68–69
Linking options:
https://www.mathnet.ru/eng/pdma11 https://www.mathnet.ru/eng/pdma/y2012/i5/p68
|
Statistics & downloads: |
Abstract page: | 129 | Full-text PDF : | 86 | References: | 36 |
|