Security conditions for information flows by memory within the MROSL DP-model
Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 82-85.

Voir la notice de l'article provenant de la source Math-Net.Ru

Some sufficient conditions for security of information flows by memory are analysed within a mandatory entity-role security model of access and information flows control in OS Linux set (MROSL DP-model). The implementation of this conditions provides, firstly, a mandatory integrity control (MIC) preventing any modification (via a proper information flow by memory) of entities with a certain integrity level by a subject-session with a small integrity level, and, secondly, a mandatory access control (MAC) preventing information flows by memory from entities with a high level of confidentiality to entities with a low level of confidentiality.
Keywords: computer security, formal model, information flow, access control.
@article{PDMA_2014_7_a36,
     author = {P. N. Devyanin},
     title = {Security conditions for information flows by memory within the {MROSL} {DP-model}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {82--85},
     publisher = {mathdoc},
     number = {7},
     year = {2014},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2014_7_a36/}
}
TY  - JOUR
AU  - P. N. Devyanin
TI  - Security conditions for information flows by memory within the MROSL DP-model
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2014
SP  - 82
EP  - 85
IS  - 7
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2014_7_a36/
LA  - ru
ID  - PDMA_2014_7_a36
ER  - 
%0 Journal Article
%A P. N. Devyanin
%T Security conditions for information flows by memory within the MROSL DP-model
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2014
%P 82-85
%N 7
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2014_7_a36/
%G ru
%F PDMA_2014_7_a36
P. N. Devyanin. Security conditions for information flows by memory within the MROSL DP-model. Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 82-85. http://geodesic.mathdoc.fr/item/PDMA_2014_7_a36/

[1] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, 2-e izd., ispr. i dop., Goryachaya liniya – Telekom, M., 2013, 338 pp.

[2] Devyanin P. N., “Adaptatsiya mandatnoi suschnostno-rolevoi DP-modeli k usloviyam funktsionirovaniya OS semeistva Linux”, Sistemy vysokoi dostupnosti, 2013, no. 3, 98–102

[3] Devyanin P. N., “Administrirovanie sistemy v ramkakh mandatnoi suschnostno-rolevoi DP-modeli upravleniya dostupom i informatsionnymi potokami v OS semeistva Linux”, Prikladnaya diskretnaya matematika, 2013, no. 4(22), 22–40

[4] Operatsionnye sistemy Astra Linux, http://www.astra-linux.ru/