skip to main content
10.1145/335169.335184acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free Access

Secure dynamic adaptive traffic masking

Published:01 September 1999Publication History
First page image

References

  1. 1.A. O. Allen. Probability, Statistics, and Queuing Theory with Computer Science Applications. Academic Press, Inc., 1990 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.L. Badger. Providing a flexible security override for trusted systems. In Proceedings of Computer Security Foundations, Workshop III, Franconia, NH, June 1990.Google ScholarGoogle ScholarCross RefCross Ref
  3. 3.P. Baran. On distributed communications, vol. ix. In Security Secrecy and Tamper Free Considerations, Memo RM-3765-PR. Rand Corp., Santa Monica, CA August 1964.Google ScholarGoogle Scholar
  4. 4.R. Browne. Mode Security: An infrastructure for covert channel suppression. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.M. P. Herlihy and J.M. Wing. Specifying security constraints with relaxation lattices. In Proceedings of Computer Security Foundations Workshop ii, Franconia, NH, June 1989.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6.ISO. Information Process Systems - Open System Interconnection- Basic Reference Model - ISO 7498. American National Standards Association, inc., New York, NY, 1984.Google ScholarGoogle Scholar
  7. 7.ISO. Information Process Systems - Open System Proposed Draft Addendum 2 ISO 7498. American National Standards Association, Inc., New York, NY, 1988.Google ScholarGoogle Scholar
  8. 8.B. Mukherjee, L.T. Heberlein, and K.N. Levitt. Network intrusion detection. IEEE Network Magazine, 8(3):26-41, May-June 1994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.R.E Newman-Wolfe and B.R. Venkatramen. Performance analysis of a method for high level prevention of traffic analysis. In Eighth Annual Computer Security Applications Conference, San Antonio, Texas, November- December 1992.Google ScholarGoogle ScholarCross RefCross Ref
  10. 10.B. Timmerman. A security model for dynamic adaptable traffic masking. In Proceedings of New Security Paradigms Workshop, Langdale, Cumbria, United Kingdom, September 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.B. Timmerman. Secure Dynamic Adaptive Traffic Masking for Traffic Flow Confidentiality on Intemetworks. Phi) thesis, University of Southern California, Los Angeles, California, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.B. Venkatramen. Prevention of Traffic Analysis and Associated Covert Channels. PhD thesis, University. University of Florida, Gainesville, Florida, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.V.L. Voydock and S.T. Kent. Security mechanisms in a transport layer protocol. Computer Networks, 8, 1984.Google ScholarGoogle Scholar
  14. 14.D. Weber. Security policies for Axmy tactical C2 systems. Technical report, Odyssey Research Associates, inc., Ithaca, NY, 1998.Google ScholarGoogle Scholar

Index Terms

  1. Secure dynamic adaptive traffic masking

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          NSPW '99: Proceedings of the 1999 workshop on New security paradigms
          September 1999
          140 pages
          ISBN:1581131496
          DOI:10.1145/335169

          Copyright © 1999 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 September 1999

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate62of170submissions,36%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader