Review lection of security models of computer system
Prikladnaâ diskretnaâ matematika, no. 11 (2009), pp. 151-190.

Voir la notice de l'article provenant de la source Math-Net.Ru

The basic properties of classical models of security of computer systems are resulted: discretionary, mandatory, role management of access, security of information flows and isolated program environment. The set models of security of logic management by access and information flows (DP-models), adapted to conditions of functioning modern computer systems are considered. Features teaching of given models are analyzed at training by specialties 090000 – “Information security”.
@article{PDM_2009_11_a5,
     author = {P. N. Devyanin},
     title = {Review lection of security models of computer system},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {151--190},
     publisher = {mathdoc},
     number = {11},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2009_11_a5/}
}
TY  - JOUR
AU  - P. N. Devyanin
TI  - Review lection of security models of computer system
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2009
SP  - 151
EP  - 190
IS  - 11
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2009_11_a5/
LA  - ru
ID  - PDM_2009_11_a5
ER  - 
%0 Journal Article
%A P. N. Devyanin
%T Review lection of security models of computer system
%J Prikladnaâ diskretnaâ matematika
%D 2009
%P 151-190
%N 11
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2009_11_a5/
%G ru
%F PDM_2009_11_a5
P. N. Devyanin. Review lection of security models of computer system. Prikladnaâ diskretnaâ matematika, no. 11 (2009), pp. 151-190. http://geodesic.mathdoc.fr/item/PDM_2009_11_a5/

[1] Bishop M., Computer Security: art and science, 2002, 1084 pp., ISBN 0-201-44099-7

[2] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem: ucheb. posobie dlya stud. vyssh. ucheb. zavedenii, Izdatelskii tsentr “Akademiya”, M., 2005, 144 pp.

[3] Scherbakov A. Yu., Sovremennaya kompyuternaya bezopasnost. Teoreticheskie osnovy. Prakticheskie aspekty: ucheb. posobie, Knizhnyi mir, M., 2009, 352 pp.

[4] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio i svyaz, M., 2006, 176 pp.

[5] Nazarov I. O., “Analiz bezopasnosti veb-sistem, v usloviyakh realizatsii uyazvimosti klassa mezhsaitovogo skriptinga”, Problemy informatsionnoi bezopasnosti. Kompyuternye sistemy/ pod red. P. D. Zegzhdy. SPb.: SPbGTU, 2007, no. 2, 105–117

[6] Nazarov I. O., “Obespechenie bezopasnosti upravleniya dostupom i informatsionnymi potokami v veb-sisteme na osnove SUBD”, Vestnik Kazanskogo gosudarstvennogo tekhnicheskogo universiteta im. A. N. Tupoleva. Kazan: KGTU im. A. N. Tupoleva, 2008, no. 2, 56–59

[7] Kolegov D. N., “DP-model kompyuternoi sistemy s funktsionalno i parametricheski assotsiirovannymi s sub'ektami suschnostyami”, Vestnik Sibirskogo gosudarstvennogo aerokosmicheskogo universiteta im. akad. M. F. Reshetneva, 2009, no. 1, 49–54

[8] Burenin P. V., “Podkhody k postroeniyu DP-modeli failovykh sistem”, Prikladnaya diskretnaya matematika, 2009, no. 1, 93–112

[9] Devyanin P. N., “Bazovaya rolevaya DP-model”, Prikladnaya diskretnaya matematika, 2008, no. 1, 64–70

[10] Devyanin P. N., “Analiz uslovii polucheniya dostupa vladeniya v ramkakh bazovoi rolevoi DP-modeli bez informatsionnykh potokov po pamyati”, Prikladnaya diskretnaya matematika, 2009, no. 3, 69–84