Integrity control in mandatory DP-model of DBMS MySQL
Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 103-105.

Voir la notice de l'article provenant de la source Math-Net.Ru

The paper reports on mandatory integrity control mechanisms elaborated for mandatory DP-model of DBMS MySQL. The elaboration is aimed at data protection from improper modification. It allows avoid information flows from entities of lower integrity level that modify entities of higher integrity level. The paper provides new elements introduced for mandatory integrity control, describes some rules of system transformation, defines the notion of state without integrity violation and gives a necessary condition for the system to stay in this state.
Keywords: access control, mandatory integrity control, information flows, formal security models.
@article{PDMA_2014_7_a44,
     author = {D. V. Chernov},
     title = {Integrity control in mandatory {DP-model} of {DBMS} {MySQL}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {103--105},
     publisher = {mathdoc},
     number = {7},
     year = {2014},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2014_7_a44/}
}
TY  - JOUR
AU  - D. V. Chernov
TI  - Integrity control in mandatory DP-model of DBMS MySQL
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2014
SP  - 103
EP  - 105
IS  - 7
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2014_7_a44/
LA  - ru
ID  - PDMA_2014_7_a44
ER  - 
%0 Journal Article
%A D. V. Chernov
%T Integrity control in mandatory DP-model of DBMS MySQL
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2014
%P 103-105
%N 7
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2014_7_a44/
%G ru
%F PDMA_2014_7_a44
D. V. Chernov. Integrity control in mandatory DP-model of DBMS MySQL. Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 103-105. http://geodesic.mathdoc.fr/item/PDMA_2014_7_a44/

[1] Kolegov D. N., Tkachenko N. O., Chernov D. V., “Razrabotka i realizatsiya mandatnykh mekhanizmov upravleniya dostupom v SUBD MySQL”, Prikladnaya diskretnaya matematika. Prilozhenie, 2013, no. 6, 62–67

[2] Biba K. J., Integrity Considerations for Secure Computer Systems, Technical Report MTR-3153, MITRE Corp., 1975

[3] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2012, 320 pp.