@article{PDM_2009_10_a18,
author = {P. N. Devyanin},
title = {Analysis of conditions for taking ownership access within the base role {DP-model} without memory-information flows},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {38--39},
year = {2009},
number = {10},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDM_2009_10_a18/}
}
TY - JOUR AU - P. N. Devyanin TI - Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows JO - Prikladnaâ diskretnaâ matematika PY - 2009 SP - 38 EP - 39 IS - 10 UR - http://geodesic.mathdoc.fr/item/PDM_2009_10_a18/ LA - ru ID - PDM_2009_10_a18 ER -
P. N. Devyanin. Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows. Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 38-39. http://geodesic.mathdoc.fr/item/PDM_2009_10_a18/
[1] Sandhu R., “Role-Based Access Control”, Advanced in Computers, 46, Academic Press, 1998
[2] Bishop M., Computer Security: art and science, 2002, 1084 pp., ISBN 0-201-44099-7
[3] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem: Ucheb. posobie dlya stud. vyssh. ucheb. zavedenii, Izdatelskii tsentr “Akademiya”, M., 2005, 144 pp.
[4] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio i svyaz, M., 2006, 176 pp.
[5] Devyanin P. N., “O razrabotke modelei bezopasnosti informatsionnykh potokov v kompyuternykh sistemakh s rolevym upravleniem dostupom”, Materialy Tretei Mezhdunar. nauch. konf. po problemam bezopasnosti i protivodeistviya terrorizmu (MGU im. Lomonosova. 25–27 oktyabrya 2007 g.), MTsNMO, M., 2008, 261–265
[6] Devyanin P. N., “Bazovaya rolevaya DP-model”, Prikladnaya diskretnaya matematika, 2008, no. 1, 64–70