Map
Index
Random
Help
th

Quote: can circumvent a security system by out-of-channel signaling, e.g., by toggling use of a file

topics > all references > references c-d > QuoteRef: dennPJ_1980 , p. 698



Topic:
security leaks and weaknesses

Quotation Skeleton

[example of security violation: Trojan horse] P arranges its use and nonuse of … [without security clearance] Q, periodically samples the file's lock bit, thus receiving the …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: security leaks and weaknesses (56 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.