Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2012_1_a5, author = {P. N. Devyanin}, title = {The role {DP-model} of access and information flows control in operating systems of {\it {Linux}} sets}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {69--90}, publisher = {mathdoc}, number = {1}, year = {2012}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2012_1_a5/} }
TY - JOUR AU - P. N. Devyanin TI - The role DP-model of access and information flows control in operating systems of {\it Linux} sets JO - Prikladnaâ diskretnaâ matematika PY - 2012 SP - 69 EP - 90 IS - 1 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDM_2012_1_a5/ LA - ru ID - PDM_2012_1_a5 ER -
P. N. Devyanin. The role DP-model of access and information flows control in operating systems of {\it Linux} sets. Prikladnaâ diskretnaâ matematika, no. 1 (2012), pp. 69-90. http://geodesic.mathdoc.fr/item/PDM_2012_1_a5/
[1] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.
[2] Devyanin P. N., Zakharenkov P. S., “Sposob realizatsii informatsionnogo potoka po vremeni v operatsionnykh sistemakh s mandatnym upravleniem dostupom cherez clipboard”, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii, Materialy Yubileinoi 20-i nauch.-tekhn. konf. (27 iyunya – 01 iyulya 2011 g.), Izd-vo Politekhn. un-ta, SPb., 2011, 76–77
[3] Kolegov D. N., “DP-model kompyuternoi sistemy s funktsionalno i parametricheski assotsiirovannymi s sub'ektami suschnostyami”, Vestnik Sibirskogo gosudarstvennogo aerokosmicheskogo universiteta im. akad. M. F. Reshetneva, 2009, no. 1(22), 49–54
[4] Devyanin P. N., “Pravila preobrazovaniya sostoyanii bazovoi rolevoi DP-modeli upravleniya dostupom i informatsionnymi potokami v operatsionnykh sistemakh”, Prikladnaya diskretnaya matematika, 2011, no. 1(11), 78–95
[5] Devyanin P. N., “Modelirovanie rolevogo upravleniya dostupom v operatsionnykh sistemakh semeistva Linux”, Problemy informatsionnoi bezopasnosti. Kompyuternye sistemy, 2011, no. 1, 24–43