Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows
Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 38-39.

Voir la notice de l'article provenant de la source Math-Net.Ru

Conditions for taking ownership access to trusted sessions by untrusted sessions are analyzed within the base role DP-model of computer systems with the role management of access. The case is considered when any number of sessions cooperate and do not take ownership access to each other using memory-information flows to entities associated functionally with sessions.
@article{PDM_2009_10_a18,
     author = {P. N. Devyanin},
     title = {Analysis of conditions for taking ownership access within the base role {DP-model} without memory-information flows},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {38--39},
     publisher = {mathdoc},
     number = {10},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2009_10_a18/}
}
TY  - JOUR
AU  - P. N. Devyanin
TI  - Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2009
SP  - 38
EP  - 39
IS  - 10
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2009_10_a18/
LA  - ru
ID  - PDM_2009_10_a18
ER  - 
%0 Journal Article
%A P. N. Devyanin
%T Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows
%J Prikladnaâ diskretnaâ matematika
%D 2009
%P 38-39
%N 10
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2009_10_a18/
%G ru
%F PDM_2009_10_a18
P. N. Devyanin. Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows. Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 38-39. http://geodesic.mathdoc.fr/item/PDM_2009_10_a18/

[1] Sandhu R., “Role-Based Access Control”, Advanced in Computers, 46, Academic Press, 1998

[2] Bishop M., Computer Security: art and science, 2002, 1084 pp., ISBN 0-201-44099-7

[3] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem: Ucheb. posobie dlya stud. vyssh. ucheb. zavedenii, Izdatelskii tsentr “Akademiya”, M., 2005, 144 pp.

[4] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio i svyaz, M., 2006, 176 pp.

[5] Devyanin P. N., “O razrabotke modelei bezopasnosti informatsionnykh potokov v kompyuternykh sistemakh s rolevym upravleniem dostupom”, Materialy Tretei Mezhdunar. nauch. konf. po problemam bezopasnosti i protivodeistviya terrorizmu (MGU im. Lomonosova. 25–27 oktyabrya 2007 g.), MTsNMO, M., 2008, 261–265

[6] Devyanin P. N., “Bazovaya rolevaya DP-model”, Prikladnaya diskretnaya matematika, 2008, no. 1, 64–70