Development and implementation of mandatory access control mechanisms in DBMS MySQL
Prikladnaya Diskretnaya Matematika. Supplement, no. 6 (2013), pp. 62-67.

Voir la notice de l'article provenant de la source Math-Net.Ru

The paper is devoted to development and implementation of mandatory access control mechanisms for DBMS MySQL based on discretionary access policy. A formal security model is proposed for multilevel security mandatory access policy. It is implemented in MySQL core reference monitor enabling to protect DBMS against prohibited information and match security requirements for trusted computer systems.
Keywords: computer security, access control, information flows, formal security model.
@article{PDMA_2013_6_a29,
     author = {D. N. Kolegov and N. O. Tkachenko and D. V. Chernov},
     title = {Development and implementation of mandatory access control mechanisms in {DBMS} {MySQL}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {62--67},
     publisher = {mathdoc},
     number = {6},
     year = {2013},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2013_6_a29/}
}
TY  - JOUR
AU  - D. N. Kolegov
AU  - N. O. Tkachenko
AU  - D. V. Chernov
TI  - Development and implementation of mandatory access control mechanisms in DBMS MySQL
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2013
SP  - 62
EP  - 67
IS  - 6
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2013_6_a29/
LA  - ru
ID  - PDMA_2013_6_a29
ER  - 
%0 Journal Article
%A D. N. Kolegov
%A N. O. Tkachenko
%A D. V. Chernov
%T Development and implementation of mandatory access control mechanisms in DBMS MySQL
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2013
%P 62-67
%N 6
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2013_6_a29/
%G ru
%F PDMA_2013_6_a29
D. N. Kolegov; N. O. Tkachenko; D. V. Chernov. Development and implementation of mandatory access control mechanisms in DBMS MySQL. Prikladnaya Diskretnaya Matematika. Supplement, no. 6 (2013), pp. 62-67. http://geodesic.mathdoc.fr/item/PDMA_2013_6_a29/

[1] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.

[2] Smirnov S. N., Bezopasnost sistem baz dannykh, Gelios ARV, M., 2007, 352 pp.

[3] Bishop M., Computer Security: art and science, Addison-Wesley Professional, 2002, 1084 pp.

[4] Smolyaninov V. Yu., “Pravila preobrazovaniya sostoyanii SUBD DP-modeli”, Prikladnaya diskretnaya matematika, 2013, no. 1, 50–68