- 1.A. O. Allen. Probability, Statistics, and Queuing Theory with Computer Science Applications. Academic Press, Inc., 1990 Google ScholarDigital Library
- 2.L. Badger. Providing a flexible security override for trusted systems. In Proceedings of Computer Security Foundations, Workshop III, Franconia, NH, June 1990.Google ScholarCross Ref
- 3.P. Baran. On distributed communications, vol. ix. In Security Secrecy and Tamper Free Considerations, Memo RM-3765-PR. Rand Corp., Santa Monica, CA August 1964.Google Scholar
- 4.R. Browne. Mode Security: An infrastructure for covert channel suppression. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1994. Google ScholarDigital Library
- 5.M. P. Herlihy and J.M. Wing. Specifying security constraints with relaxation lattices. In Proceedings of Computer Security Foundations Workshop ii, Franconia, NH, June 1989.Google ScholarCross Ref
- 6.ISO. Information Process Systems - Open System Interconnection- Basic Reference Model - ISO 7498. American National Standards Association, inc., New York, NY, 1984.Google Scholar
- 7.ISO. Information Process Systems - Open System Proposed Draft Addendum 2 ISO 7498. American National Standards Association, Inc., New York, NY, 1988.Google Scholar
- 8.B. Mukherjee, L.T. Heberlein, and K.N. Levitt. Network intrusion detection. IEEE Network Magazine, 8(3):26-41, May-June 1994.Google ScholarDigital Library
- 9.R.E Newman-Wolfe and B.R. Venkatramen. Performance analysis of a method for high level prevention of traffic analysis. In Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November- December 1992.Google ScholarCross Ref
- 10.B. Timmerman. A security model for dynamic adaptable traffic masking. In Proceedings of New Security Paradigms Workshop, Langdale, Cumbria, United Kingdom, September 1997. Google ScholarDigital Library
- 11.B. Timmerman. Secure Dynamic Adaptive Traffic Masking for Traffic Flow Confidentiality on Intemetworks. Phi) thesis, University of Southern California, Los Angeles, California, 1997. Google ScholarDigital Library
- 12.B. Venkatramen. Prevention of Traffic Analysis and Associated Covert Channels. PhD thesis, University. University of Florida, Gainesville, Florida, 1994. Google ScholarDigital Library
- 13.V.L. Voydock and S.T. Kent. Security mechanisms in a transport layer protocol. Computer Networks, 8, 1984.Google Scholar
- 14.D. Weber. Security policies for Axmy tactical C2 systems. Technical report, Odyssey Research Associates, inc., Ithaca, NY, 1998.Google Scholar
Index Terms
- Secure dynamic adaptive traffic masking
Recommendations
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be static (meaning that it controls a predetermined subset of the parties) or ...
Comments