Within SRM (Shared Resource Methodology) a matrix with the subjects and the objects of the analysis basis (formal or informal specification or possibly program) is generated. The access authorizations of the subjects to the objects are entered in the items of the matrix. By means of these entries it is investigated whether an impermissible information flow is possible. The success of the method strongly depends on the choice of suitable subjects and objects.
Within the V-Model an analysis of covert channels is not required. The ACC - Analysis of Covert Channels has to be performed if within the security requirements according to /ITSEC/ covert channels are excluded.