Security violation necessary conditions for time information flows in MROSL DP-model
Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 81-83.

Voir la notice de l'article provenant de la source Math-Net.Ru

This article presents a theorem about the security violation necessary conditions for time information flows in Linux family operating systems. The conditions are easily to implement. According to these conditions, to prevent prohibited time information flows it is necessary: 1) to eliminate containers where both the Boolean mandatory attribute CCR (Container Clearance Required) and the integrity attribute CCRI (CCR for integrity) are true; 2) to eliminate containers which include entities with less level of confidentiality; 3) to completely prohibit using entities-“holes” not saving data or use their implementation not creating time information flows. After this, for the access control security in OS Astra Linux Special Edition, it is sufficient to ensure the memory information flows security in the sense of Bell–LaPadula model and the mandatory integrity control.
Keywords: computer security, formal model, information flow.
@article{PDMA_2015_8_a29,
     author = {P. N. Devyanin},
     title = {Security violation necessary conditions for time information flows in {MROSL} {DP-model}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {81--83},
     publisher = {mathdoc},
     number = {8},
     year = {2015},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2015_8_a29/}
}
TY  - JOUR
AU  - P. N. Devyanin
TI  - Security violation necessary conditions for time information flows in MROSL DP-model
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2015
SP  - 81
EP  - 83
IS  - 8
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2015_8_a29/
LA  - ru
ID  - PDMA_2015_8_a29
ER  - 
%0 Journal Article
%A P. N. Devyanin
%T Security violation necessary conditions for time information flows in MROSL DP-model
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2015
%P 81-83
%N 8
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2015_8_a29/
%G ru
%F PDMA_2015_8_a29
P. N. Devyanin. Security violation necessary conditions for time information flows in MROSL DP-model. Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 81-83. http://geodesic.mathdoc.fr/item/PDMA_2015_8_a29/

[1] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, 2-e izd., ispr. i dop., Goryachaya liniya – Telekom, M., 2013, 338 pp.

[2] Devyanin P. N., “Adaptatsiya mandatnoi suschnostno-rolevoi DP-modeli k usloviyam funktsionirovaniya OS semeistva Linux”, Sistemy vysokoi dostupnosti, 2013, no. 3, 98–102

[3] Devyanin P. N., “Administrirovanie sistemy v ramkakh mandatnoi suschnostno-rolevoi DP-modeli upravleniya dostupom i informatsionnymi potokami v OS semeistva Linux”, Prikladnaya diskretnaya matematika, 2013, no. 4(22), 22–40

[4] Operatsionnye sistemy Astra Linux, http://www.astra-linux.ru/

[5] Devyanin P. N., “Usloviya bezopasnosti informatsionnykh potokov po pamyati v ramkakh MROSL DP-modeli”, Prikladnaya diskretnaya matematika. Prilozhenie, 2014, no. 7, 82–85

[6] Devyanin P. N., Kulikov G. V., Khoroshilov A. V., “Kompleksnoe nauchno-obosnovannoe reshenie po razrabotke otechestvennoi zaschischennoi OSSN Astra Linux Special Edition”, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii, Materialy 23-i nauch.-tekhnich. konf. (30 iyunya – 03 iyulya 2014 g.), Izd-vo Politekhn. un-ta, SPb., 2014, 29–33