Transformation rules for states in base role DP-model of access control and information flows in operating systems
Prikladnaâ diskretnaâ matematika, no. 1 (2011), pp. 78-95.

Voir la notice de l'article provenant de la source Math-Net.Ru

The base role DP-model of access control and information flows in operating systems is presented. In comparison with BR DP-model this one includes registration records of users, entities and parameters associated with subjects-sessions or roles, mandatory integrity control and actual access subject-sessions. The article focuses basic attention on changes in conditions and results of application of transformation rules for states. It is proved that the only monotonous transformation rules are sufficient for the analysis of conditions for role access rights transfer, access reception and information flows realization.
Keywords: computer security, role DP-model, operating system.
@article{PDM_2011_1_a5,
     author = {P. N. Devyanin},
     title = {Transformation rules for states in base role {DP-model} of access control and information flows in operating systems},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {78--95},
     publisher = {mathdoc},
     number = {1},
     year = {2011},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2011_1_a5/}
}
TY  - JOUR
AU  - P. N. Devyanin
TI  - Transformation rules for states in base role DP-model of access control and information flows in operating systems
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2011
SP  - 78
EP  - 95
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2011_1_a5/
LA  - ru
ID  - PDM_2011_1_a5
ER  - 
%0 Journal Article
%A P. N. Devyanin
%T Transformation rules for states in base role DP-model of access control and information flows in operating systems
%J Prikladnaâ diskretnaâ matematika
%D 2011
%P 78-95
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2011_1_a5/
%G ru
%F PDM_2011_1_a5
P. N. Devyanin. Transformation rules for states in base role DP-model of access control and information flows in operating systems. Prikladnaâ diskretnaâ matematika, no. 1 (2011), pp. 78-95. http://geodesic.mathdoc.fr/item/PDM_2011_1_a5/

[1] Devyanin P. N., “Analiz v ramkakh bazovoi rolevoi DP-modeli bezopasnosti sistem s prostymi traektoriyami funktsionirovaniya”, Prikladnaya diskretnaya matematika, 2010, no. 1(7), 16–36

[2] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.

[3] Kolegov D. N., “DP-model kompyuternoi sistemy s funktsionalno i parametricheski assotsiirovannymi s sub'ektami suschnostyami”, Vestnik Sibirskogo gosudarstvennogo aerokosmicheskogo universiteta im. akad. M. F. Reshetneva, 2009, no. 1(22), Ch. 1, 49–54

[4] Burenin P. V., “Podkhody k postroeniyu DP-modeli failovykh sistem”, Prikladnaya diskretnaya matematika, 2009, no. 1(3), 93–112