Transformation rules for states in base role DP-model of access control and information flows in operating systems
Prikladnaâ diskretnaâ matematika, no. 1 (2011), pp. 78-95
Voir la notice de l'article provenant de la source Math-Net.Ru
The base role DP-model of access control and information flows in operating systems is presented. In comparison with BR DP-model this one includes registration records of users, entities and parameters associated with subjects-sessions or roles, mandatory integrity control and actual access subject-sessions. The article focuses basic attention on changes in conditions and results of application of transformation rules for states. It is proved that the only monotonous transformation rules are sufficient for the analysis of conditions for role access rights transfer, access reception and information flows realization.
Keywords:
computer security, role DP-model, operating system.
@article{PDM_2011_1_a5,
author = {P. N. Devyanin},
title = {Transformation rules for states in base role {DP-model} of access control and information flows in operating systems},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {78--95},
publisher = {mathdoc},
number = {1},
year = {2011},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDM_2011_1_a5/}
}
TY - JOUR AU - P. N. Devyanin TI - Transformation rules for states in base role DP-model of access control and information flows in operating systems JO - Prikladnaâ diskretnaâ matematika PY - 2011 SP - 78 EP - 95 IS - 1 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDM_2011_1_a5/ LA - ru ID - PDM_2011_1_a5 ER -
P. N. Devyanin. Transformation rules for states in base role DP-model of access control and information flows in operating systems. Prikladnaâ diskretnaâ matematika, no. 1 (2011), pp. 78-95. http://geodesic.mathdoc.fr/item/PDM_2011_1_a5/