Information Flow and Covert Channels November, 2006.
12/2/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 2 Security Policies and Models Stallings Chapters 4,10 Article [J3]