Title :
Modelling a fuzzy time system
Author :
Trostle, Jonathan T.
Author_Institution :
The MITRE Corp., Bedford, MA, USA
Abstract :
The author gives an analysis of the fuzzy time covert channel reduction technique developed at the Digital Equipment Corporation (DEC) and applied to the VAX security kernel for both a single computer system and a network of hosts. Specifically, he investigates covert channels in a model of a fuzzy time system and in a network model of n fuzzy time hosts and one nonfuzzy time host. The fuzzy time operating system model predicts a covert channel with a datarate of roughly 50 b/s, given a mean time between upticks of 20 ms as in the VAX security kernel. Several countermeasures including scheduler redesign are suggested, which will close or reduce the channels that are analyzed
Keywords :
DEC computers; fuzzy logic; operating systems (computers); security of data; Digital Equipment Corporation; VAX security kernel; countermeasures; covert channel reduction technique; covert channels; fuzzy time operating system model; fuzzy time system; scheduler redesign; Clocks; Computer networks; Data security; Fuzzy systems; Information security; Kernel; Operating systems; Predictive models; Scheduling; Timing;
Conference_Titel :
Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer Society Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-3370-0
DOI :
10.1109/RISP.1993.287641