Correctness of state transformation rules in MROSL DP-model
Prikladnaya Diskretnaya Matematika. Supplement, no. 6 (2013), pp. 58-59
Cet article a éte moissonné depuis la source Math-Net.Ru
Conditions and results of application are analysed for state transformation rules in mandatory entity-role security model of access and information flows control in OS of Linux set (MROSL DP-model). The correctness of the rules is considered with regard to requirements of mandatory access control (MAC), mandatory integrity control (MIC) and role-based access control (RBAC).
Keywords:
computer security, formal model, access control.
@article{PDMA_2013_6_a27,
author = {P. N. Devyanin},
title = {Correctness of state transformation rules in {MROSL} {DP-model}},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {58--59},
year = {2013},
number = {6},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2013_6_a27/}
}
P. N. Devyanin. Correctness of state transformation rules in MROSL DP-model. Prikladnaya Diskretnaya Matematika. Supplement, no. 6 (2013), pp. 58-59. http://geodesic.mathdoc.fr/item/PDMA_2013_6_a27/
[1] Operatsionnye sistemy Astra Linux http://www.astra-linux.ru/
[2] Devyanin P. N., “O razrabotke mandatnoi suschnostno-rolevoi DP-modeli upravleniya dostupom i informatsionnymi potokami v operatsionnykh sistemakh semeistva Linux”, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii, Materialy 21-i nauch.-tekhnich. konf. (24–29 iyunya 2012 g.), Izd-vo Politekhn. un-ta, SPb., 2012, 91–94
[3] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, 2-e izd., ispr. i dop., Goryachaya liniya-Telekom, M., 2013, 338 pp.