Analysis of conditions for reception of access owning within the base role DP-model of computer systems without memory information flows
Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 69-84.

Voir la notice de l'article provenant de la source Math-Net.Ru

Necessary and sufficient conditions for the reception by untrusted user sessions of access owning to trusted user sessions are stated within the base role DP-model of computer systems with the role management of access. It is supposed in the consideration that any number of user sessions cooperate, and they do not get access owning to each other with the use of memory information flows to entities functionally associated with the user sessions.
@article{PDM_2009_3_a7,
     author = {P. N. Devyanin},
     title = {Analysis of conditions for reception of access owning within the base role {DP-model} of computer systems without memory information flows},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {69--84},
     publisher = {mathdoc},
     number = {3},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2009_3_a7/}
}
TY  - JOUR
AU  - P. N. Devyanin
TI  - Analysis of conditions for reception of access owning within the base role DP-model of computer systems without memory information flows
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2009
SP  - 69
EP  - 84
IS  - 3
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2009_3_a7/
LA  - ru
ID  - PDM_2009_3_a7
ER  - 
%0 Journal Article
%A P. N. Devyanin
%T Analysis of conditions for reception of access owning within the base role DP-model of computer systems without memory information flows
%J Prikladnaâ diskretnaâ matematika
%D 2009
%P 69-84
%N 3
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2009_3_a7/
%G ru
%F PDM_2009_3_a7
P. N. Devyanin. Analysis of conditions for reception of access owning within the base role DP-model of computer systems without memory information flows. Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 69-84. http://geodesic.mathdoc.fr/item/PDM_2009_3_a7/

[1] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem, Ucheb. posobie dlya stud. vyssh. ucheb. zavedenii, Izdatelskii tsentr “Akademiya”, M., 2005, 144 pp.

[2] Bishop M., Computer Security: art and science, ISBN 0-201-44099-7, 2002, 1084 pp.

[3] Sandhu R., Role-Based Access Control, Advanced in Computers, 46, Academic Press, 1998

[4] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio i svyaz, M., 2006, 176 pp.

[5] Devyanin P. N., “O razrabotke modelei bezopasnosti informatsionnykh potokov v kompyuternykh sistemakh s rolevym upravleniem dostupom”, Materialy Tretei Mezhdunar. nauchn. konf. po problemam bezopasnosti i protivodeistviya terrorizmu (MGU im. M. V. Lomonosova, 25–27 oktyabrya 2007 g.), MTsNMO, M., 2008, 261–265

[6] Devyanin P. N., “Bazovaya rolevaya DP-model”, Prikladnaya diskretnaya matematika, 2008, no. 1(1), 64–70