Formation of a~dictionary of terms in the theory of modeling the secure access and information flows control in computer systems
Prikladnaâ diskretnaâ matematika, no. 2 (2011), pp. 17-39.

Voir la notice de l'article provenant de la source Math-Net.Ru

The work presents a dictionary project for the theory of modeling the secure access and information flows control in computer systems. The purpose of the dictionary formation is to define the main notions and terms in the computer security for using in science and education. The dictionary is created on the basis of the terminology existing in standards, in the classical models and in the DP-models of the computer security.
Keywords: computer security, access control, information flows, DP-model, dictionary.
@article{PDM_2011_2_a1,
     author = {P. N. Devyanin},
     title = {Formation of a~dictionary of terms in the theory of modeling the secure access and information flows control in computer systems},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {17--39},
     publisher = {mathdoc},
     number = {2},
     year = {2011},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2011_2_a1/}
}
TY  - JOUR
AU  - P. N. Devyanin
TI  - Formation of a~dictionary of terms in the theory of modeling the secure access and information flows control in computer systems
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2011
SP  - 17
EP  - 39
IS  - 2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2011_2_a1/
LA  - ru
ID  - PDM_2011_2_a1
ER  - 
%0 Journal Article
%A P. N. Devyanin
%T Formation of a~dictionary of terms in the theory of modeling the secure access and information flows control in computer systems
%J Prikladnaâ diskretnaâ matematika
%D 2011
%P 17-39
%N 2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2011_2_a1/
%G ru
%F PDM_2011_2_a1
P. N. Devyanin. Formation of a~dictionary of terms in the theory of modeling the secure access and information flows control in computer systems. Prikladnaâ diskretnaâ matematika, no. 2 (2011), pp. 17-39. http://geodesic.mathdoc.fr/item/PDM_2011_2_a1/

[1] Bazovaya model ugroz bezopasnosti personalnykh dannykh pri ikh obrabotke v informatsionnykh sistemakh personalnykh dannykh, Metodicheskie materialy FSTEK, 2008

[2] Bezopasnost informatsionnykh tekhnologii. Kriterii otsenki bezopasnosti informatsionnykh tekhnologii, Rukovodyaschii dokument. GOST R ISO/MEK 15408-2002

[3] Zaschita informatsii. Osnovnye terminy i opredeleniya, Natsionalnyi standart Rossiiskoi Federatsii. GOST R 50922-2006

[4] Zaschita informatsionnykh tekhnologii i avtomatizirovannykh sistem ot ugroz informatsionnoi bezopasnosti, realizuemykh s ispolzovaniem skrytykh kanalov, Natsionalnyi standart Rossiiskoi Federatsii. GOST R 53113.1-2008, GOST R 53113.2-2009

[5] Kontseptsiya zaschity sredstv vychislitelnoi tekhniki i avtomatizirovannykh sistem ot nesanktsionirovannogo dostupa k informatsii, Gostekhkomissiya Rossii. Rukovodyaschii dokument, 1992

[6] Tekhnicheskaya zaschita informatsii. Osnovnye terminy i opredeleniya, Rekomendatsii po standartizatsii. R 50.1.056-2005

[7] Scherbakov A. Yu., Sovremennaya kompyuternaya bezopasnost. Teoreticheskie osnovy. Prakticheskie aspekty, Ucheb. posobie, Knizhnyi mir, M., 2009, 352 pp.

[8] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, Goryachaya liniya – Telekom, M., 2011, 320 pp.

[9] Nosov V. A., Osnovy teorii algoritmov i analiza ikh slozhnosti, Kurs lektsii, MGU, M., 1992, 140 pp.