Sufficient conditions for access rights stealing in DP-model of database management systems
Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 75-76
Cet article a éte moissonné depuis la source Math-Net.Ru
For a security theoretical analysis of database management systems, a DP-model of them is suggested. Sufficient conditions for stealing access rights in it are formulated.
@article{PDMA_2012_5_a38,
author = {V. Y. Slolyaninov},
title = {Sufficient conditions for access rights stealing in {DP-model} of database management systems},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {75--76},
year = {2012},
number = {5},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a38/}
}
TY - JOUR AU - V. Y. Slolyaninov TI - Sufficient conditions for access rights stealing in DP-model of database management systems JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2012 SP - 75 EP - 76 IS - 5 UR - http://geodesic.mathdoc.fr/item/PDMA_2012_5_a38/ LA - ru ID - PDMA_2012_5_a38 ER -
V. Y. Slolyaninov. Sufficient conditions for access rights stealing in DP-model of database management systems. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 75-76. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a38/
[1] Devyanin P. N., “Rolevaya DP-model upravleniya dostupom i informatsionnymi potokami v operatsionnykh sistemakh semeistva Linux”, Prikladnaya diskretnaya matematika, 2012, no. 1(15), 69–90