Teaching the models of access and information flows management within discipline “Theoretical foundations of computer security”
Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 39-41
The basic properties of classical security models of computer systems are considered: discretionary, mandatory, role management of access, security of information flows and isolated program environment. The set of security models of the access and information flows management (DP-models) adapted to conditions of functioning modern computer systems are considered too. The features of teaching the given models are analyzed with respect to specialities 090102 – “Computer security” and 090105 – “Information security of automated systems”.
@article{PDM_2009_10_a19,
author = {P. N. Devyanin},
title = {Teaching the models of access and information flows management within discipline {{\textquotedblleft}Theoretical} foundations of computer security{\textquotedblright}},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {39--41},
year = {2009},
number = {10},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDM_2009_10_a19/}
}
TY - JOUR AU - P. N. Devyanin TI - Teaching the models of access and information flows management within discipline “Theoretical foundations of computer security” JO - Prikladnaâ diskretnaâ matematika PY - 2009 SP - 39 EP - 41 IS - 10 UR - http://geodesic.mathdoc.fr/item/PDM_2009_10_a19/ LA - ru ID - PDM_2009_10_a19 ER -
%0 Journal Article %A P. N. Devyanin %T Teaching the models of access and information flows management within discipline “Theoretical foundations of computer security” %J Prikladnaâ diskretnaâ matematika %D 2009 %P 39-41 %N 10 %U http://geodesic.mathdoc.fr/item/PDM_2009_10_a19/ %G ru %F PDM_2009_10_a19
P. N. Devyanin. Teaching the models of access and information flows management within discipline “Theoretical foundations of computer security”. Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 39-41. http://geodesic.mathdoc.fr/item/PDM_2009_10_a19/
[1] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem: Ucheb. posobie dlya stud. vyssh. ucheb. zavedenii, Akademiya, M., 2005, 144 pp.
[2] Bishop M., Computer Security: Art and Science, 2002, 1084 pp., ISBN 0-201-44099-7
[3] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio i svyaz, M., 2006, 176 pp.