With the increasing growth of electronic communications, it is becoming important to provide a mechanism for enforcing various security policies on network communications. This paper discusses our implementation of several previously proposed protocols that enforce theell LaPadula security model. We also introduce a new protocol called "Quantized Pump" that offers several advantages, and present experimental results to support our claims.
Cited By
- Wendzel S, Zander S, Fechner B and Herdin C (2015). Pattern-Based Survey and Categorization of Network Covert Channel Techniques, ACM Computing Surveys, 47:3, (1-26), Online publication date: 16-Apr-2015.
- Khan H, Javed Y, Mirza F and Khayam S Embedding a covert channel in active network connections Proceedings of the 28th IEEE conference on Global telecommunications, (4933-4938)
Recommendations
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should be carried out in a secure way, meaning that no coalition of corrupted ...
Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries
In the setting of secure two-party computation, two parties wish to securely compute a joint function of their private inputs, while revealing only the output. One of the primary techniques for achieving efficient secure two-party computation is that of ...
Covert two-party computation
STOC '05: Proceedings of the thirty-seventh annual ACM symposium on Theory of computingWe introduce covert two-party computation, a stronger notion of security than standard secure two-party computation. Like standard secure two-party computation, covert two-party computation allows Alice and Bob, with secret inputs xA and xB respectively,...