Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2012_5_a32, author = {D. M. Brechka}, title = {The search for bridges in {Take-Grant} security model}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {63--65}, publisher = {mathdoc}, number = {5}, year = {2012}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a32/} }
D. M. Brechka. The search for bridges in Take-Grant security model. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 63-65. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a32/
[1] Lipton R. J., Richard J., “A Linear Time Algorithm for Deciding Subject Security”, J. ACM, 24:3 (1977), 455–464 | DOI | MR | Zbl
[2] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem, ucheb. posobie dlya studentov vysshikh uchebnykh zavedenii, Akademiya, M., 2005, 144 pp.
[3] Gaidamakin N. A., Razgranicheniya dostupa k informatsii v kompyuternykh sistemakh, Izd-vo Ural. un-ta, Ekaterinburg, 2003, 328 pp.
[4] Kormen T., Leizerson Ch., Rivest R., Shtain K., Algoritmy: postroenie i analiz, MTsNMO, M., 2000, 960 pp.