Conference
Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics
Abstract
This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage …
Authors
Jaskolka J; Khedri R; Sabri KE
Volume
34
Pagination
pp. 266-275
Publisher
Elsevier
Publication Date
2014
DOI
10.1016/j.procs.2014.07.022
Conference proceedings
Procedia Computer Science
ISSN
1877-0509