Re: investigating meta-spam

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



In message <6.2.3.4.2.20051017024019.054c0c90@xxxxxxxxxxxxxxx>, "JFC (Jefsey) M
orfin" writes:
>At 02:20 17/10/2005, Sam Hartman wrote:
>>I think documenting this sort of thing would be useful.  I think it is
>>more often called covert channel analysis or examined under the
>>heading of privacy implications of protocols.
>
>I would be interested in URL or RFC references.
>Also, I understand you refer more to the analysis of existing normal entries?
>Here I refer mainly to malignious inputs or the ill designedness of 
>some protocols.

Covert channels are generally studied in the context of multi-level 
secure systems, i.e., ones with mandatory access controls that separate 
different security levels.  Google will give you many good references 
on the first page of answers.

		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]