Skip to main content

Noninterference and covert channel analysis

  • Security can be compromised by users sharing systems with parties who are not supposed to be able to get any information about them.
  • Highly relevant to Cloud.
  • At the leading edge of formulating and automating methods for discovering unwelcome information flows, including, for the first time, timing channels.

People

Share this: