A Reflective Covert Channel Attack Anchored on Trusted Web Services.
Feng ZhuYoungtae YunJinpeng WeiBrent ByungHoon KangYongzhi WangDaehyeok KimPeng LiHe XuRuchuan WangPublished in: ICWS (2018)
Keyphrases
- covert channel
- web services
- trust relationships
- security requirements
- business processes
- service oriented
- service composition
- web service composition
- network traffic
- countermeasures
- service oriented architecture
- web applications
- service providers
- open distributed systems
- numerical simulations
- secret key
- business process
- trusted computing
- access control
- case study