Development and implementation of mandatory access control mechanisms in DBMS MySQL
Prikladnaya Diskretnaya Matematika. Supplement, no. 6 (2013), pp. 62-67
Cet article a éte moissonné depuis la source Math-Net.Ru
The paper is devoted to development and implementation of mandatory access control mechanisms for DBMS MySQL based on discretionary access policy. A formal security model is proposed for multilevel security mandatory access policy. It is implemented in MySQL core reference monitor enabling to protect DBMS against prohibited information and match security requirements for trusted computer systems.
Keywords:
computer security, access control, information flows, formal security model.
@article{PDMA_2013_6_a29,
author = {D. N. Kolegov and N. O. Tkachenko and D. V. Chernov},
title = {Development and implementation of mandatory access control mechanisms in {DBMS} {MySQL}},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {62--67},
year = {2013},
number = {6},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2013_6_a29/}
}
TY - JOUR AU - D. N. Kolegov AU - N. O. Tkachenko AU - D. V. Chernov TI - Development and implementation of mandatory access control mechanisms in DBMS MySQL JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2013 SP - 62 EP - 67 IS - 6 UR - http://geodesic.mathdoc.fr/item/PDMA_2013_6_a29/ LA - ru ID - PDMA_2013_6_a29 ER -
%0 Journal Article %A D. N. Kolegov %A N. O. Tkachenko %A D. V. Chernov %T Development and implementation of mandatory access control mechanisms in DBMS MySQL %J Prikladnaya Diskretnaya Matematika. Supplement %D 2013 %P 62-67 %N 6 %U http://geodesic.mathdoc.fr/item/PDMA_2013_6_a29/ %G ru %F PDMA_2013_6_a29
D. N. Kolegov; N. O. Tkachenko; D. V. Chernov. Development and implementation of mandatory access control mechanisms in DBMS MySQL. Prikladnaya Diskretnaya Matematika. Supplement, no. 6 (2013), pp. 62-67. http://geodesic.mathdoc.fr/item/PDMA_2013_6_a29/
[1] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.
[2] Smirnov S. N., Bezopasnost sistem baz dannykh, Gelios ARV, M., 2007, 352 pp.
[3] Bishop M., Computer Security: art and science, Addison-Wesley Professional, 2002, 1084 pp.
[4] Smolyaninov V. Yu., “Pravila preobrazovaniya sostoyanii SUBD DP-modeli”, Prikladnaya diskretnaya matematika, 2013, no. 1, 50–68