About results of designing hierarchical representation of MROSL DP-model
Prikladnaya Diskretnaya Matematika. Supplement, no. 9 (2016), pp. 83-87.

Voir la notice de l'article provenant de la source Math-Net.Ru

This article describes new approach to the hierarchical representation of mandatory entity-role DP-model of secure access and information flows control in OS of Linux set (MROSL DP-model). Existing “monolithic” description of MROSL DP-model is the basis of the access control mechanism in secure OS Astra Linux Special Edition. However, “monolithic” description of MROSL DP-model has considerable size and complexity. It is inconvenient for scientific analysis, verification and further development, as well as for its direct application in OS Astra Linux Special Edition. For this reason, a hierarchical representation of MROSL DP-model is completely revised, and we can describe it through its levels. Thus, each lower level of MROSL DP-model is an abstract system, whose elements are independent of the new elements belonging to a higher level of MROSL DP-model. When it is necessary, a higher level inherits, corrects or complements the lower level elements. There are four levels in this hierarchical representation of MROSL DP-model. First level corresponds to role-based access control (RBAC), second level – RBAC and mandatory integrity control (MIC), third level – RBAC, MIC and mandatory access control (MAC) with information flows by memory, and fourth level – RBAC, MIC and MAC with information flows by memory and by time. New levels of lateral “branches” may be added to MROSL DP-model in the future. Some alternative levels can be: alternative third level – RBAC, MIC and a model of hypervisor, or alternative fourth level – RBAC, MIC, MAC with information flows by memory and a model of RBAC in a network.
Keywords: computer security, formal model, hierarchical description
Mots-clés : Linux.
@article{PDMA_2016_9_a31,
     author = {P. N. Devyanin},
     title = {About results of designing hierarchical representation of {MROSL} {DP-model}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {83--87},
     publisher = {mathdoc},
     number = {9},
     year = {2016},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2016_9_a31/}
}
TY  - JOUR
AU  - P. N. Devyanin
TI  - About results of designing hierarchical representation of MROSL DP-model
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2016
SP  - 83
EP  - 87
IS  - 9
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2016_9_a31/
LA  - ru
ID  - PDMA_2016_9_a31
ER  - 
%0 Journal Article
%A P. N. Devyanin
%T About results of designing hierarchical representation of MROSL DP-model
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2016
%P 83-87
%N 9
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2016_9_a31/
%G ru
%F PDMA_2016_9_a31
P. N. Devyanin. About results of designing hierarchical representation of MROSL DP-model. Prikladnaya Diskretnaya Matematika. Supplement, no. 9 (2016), pp. 83-87. http://geodesic.mathdoc.fr/item/PDMA_2016_9_a31/

[1] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, 2-e izd., ispr. i dop., Goryachaya liniya – Telekom, M., 2013, 338 pp.

[2] Devyanin P. N., “Neobkhodimye usloviya narusheniya bezopasnosti informatsionnykh potokov po vremeni v ramkakh MROSL DP-modeli”, Prikladnaya diskretnaya matematika. Prilozhenie, 2015, no. 8, 81–83

[3] Devyanin P. N., Kulikov G. V., Khoroshilov A. V., “Kompleksnoe nauchno-obosnovannoe reshenie po razrabotke otechestvennoi zaschischennoi OSSN Astra Linux Special Edition”, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii, Materialy 23-i nauch.-tekhnich. konf. (30 iyunya–03 iyulya 2014 g.), Izd-vo Politekhn. un-ta, SPb., 2014, 29–33

[4] Operatsionnye sistemy Astra Linux, http://www.astra-linux.ru/

[5] Astra Linux, https://ru.wikipedia.org/wiki/Astra_Linux

[6] Devyanin P. N., Kulyamin V. V., Petrenko A. K. i dr., “O predstavlenii MROSL DP-modeli v formalizovannoi notatsii Event-B”, Problemy informatsionnoi bezopasnosti. Kompyuternye sistemy, 2014, no. 3, 7–15

[7] Devyanin P., Khoroshilov A., Kuliamin V., et al., “Formal verification of OS security model with Alloy and Event-B”, LNCS, 8477, 2014, 309–313