Transformation rules for states in the DBMS DP-model
Prikladnaâ diskretnaâ matematika, no. 1 (2013), pp. 50-68.

Voir la notice de l'article provenant de la source Math-Net.Ru

In this article, the DBMS DP-model of access control is introduced for relational database management systems (abbreviated DBMS). For taking into account an access control features in a databases, the model includes procedures, triggers, access rights specific for databases, access rights inheritance and context dynamic change when activating procedures and triggers. The claim about granting access rights to the procedures and containers is proved.
Keywords: computer security, DBMS DP-model, database management system.
@article{PDM_2013_1_a4,
     author = {V. Y. Smolyaninov},
     title = {Transformation rules for states in the {DBMS} {DP-model}},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {50--68},
     publisher = {mathdoc},
     number = {1},
     year = {2013},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2013_1_a4/}
}
TY  - JOUR
AU  - V. Y. Smolyaninov
TI  - Transformation rules for states in the DBMS DP-model
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2013
SP  - 50
EP  - 68
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2013_1_a4/
LA  - ru
ID  - PDM_2013_1_a4
ER  - 
%0 Journal Article
%A V. Y. Smolyaninov
%T Transformation rules for states in the DBMS DP-model
%J Prikladnaâ diskretnaâ matematika
%D 2013
%P 50-68
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2013_1_a4/
%G ru
%F PDM_2013_1_a4
V. Y. Smolyaninov. Transformation rules for states in the DBMS DP-model. Prikladnaâ diskretnaâ matematika, no. 1 (2013), pp. 50-68. http://geodesic.mathdoc.fr/item/PDM_2013_1_a4/

[1] Rukovodyaschii dokument. Bezopasnost informatsionnykh tekhnologii. Kriterii otsenki bezopasnosti informatsionnykh tekhnologii, v 3 ch. Vvedën v deistvie Prikazom Gostekhkomissii Rossii ot 19.06.02 g., No 187

[2] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.

[3] Kolegov D. N., Diskretsionnaya model bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh s funktsionalno ili parametricheski assotsiirovannymi suschnostyami, Dis. ... kand. tekhn. nauk, Tomsk, 2009

[4] Devyanin P. N., “Rolevaya DP-model upravleniya dostupom i informatsionnymi potokami v operatsionnykh sistemakh semeistva Linux”, Prikladnaya diskretnaya matematika, 2012, no. 1(15), 69–90