Correctness of state transformation rules in MROSL DP-model
Prikladnaya Diskretnaya Matematika. Supplement, no. 6 (2013), pp. 58-59.

Voir la notice de l'article provenant de la source Math-Net.Ru

Conditions and results of application are analysed for state transformation rules in mandatory entity-role security model of access and information flows control in OS of Linux set (MROSL DP-model). The correctness of the rules is considered with regard to requirements of mandatory access control (MAC), mandatory integrity control (MIC) and role-based access control (RBAC).
Keywords: computer security, formal model, access control.
@article{PDMA_2013_6_a27,
     author = {P. N. Devyanin},
     title = {Correctness of state transformation rules in {MROSL} {DP-model}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {58--59},
     publisher = {mathdoc},
     number = {6},
     year = {2013},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2013_6_a27/}
}
TY  - JOUR
AU  - P. N. Devyanin
TI  - Correctness of state transformation rules in MROSL DP-model
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2013
SP  - 58
EP  - 59
IS  - 6
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2013_6_a27/
LA  - ru
ID  - PDMA_2013_6_a27
ER  - 
%0 Journal Article
%A P. N. Devyanin
%T Correctness of state transformation rules in MROSL DP-model
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2013
%P 58-59
%N 6
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2013_6_a27/
%G ru
%F PDMA_2013_6_a27
P. N. Devyanin. Correctness of state transformation rules in MROSL DP-model. Prikladnaya Diskretnaya Matematika. Supplement, no. 6 (2013), pp. 58-59. http://geodesic.mathdoc.fr/item/PDMA_2013_6_a27/

[1] Operatsionnye sistemy Astra Linux http://www.astra-linux.ru/

[2] Devyanin P. N., “O razrabotke mandatnoi suschnostno-rolevoi DP-modeli upravleniya dostupom i informatsionnymi potokami v operatsionnykh sistemakh semeistva Linux”, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii, Materialy 21-i nauch.-tekhnich. konf. (24–29 iyunya 2012 g.), Izd-vo Politekhn. un-ta, SPb., 2012, 91–94

[3] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, 2-e izd., ispr. i dop., Goryachaya liniya-Telekom, M., 2013, 338 pp.