Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2018_1_a4, author = {P. N. Devyanin}, title = {The level of negative roles of the hierarchical representation of {MROSL} {DP-model}}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {58--71}, publisher = {mathdoc}, number = {1}, year = {2018}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2018_1_a4/} }
P. N. Devyanin. The level of negative roles of the hierarchical representation of MROSL DP-model. Prikladnaâ diskretnaâ matematika, no. 1 (2018), pp. 58-71. http://geodesic.mathdoc.fr/item/PDM_2018_1_a4/
[1] Sandhu R., “Role-Based Access Control”, Advanced in Computers, 46, Academic Press, 1998
[2] Devyanin P. N., Security Models of Computer Systems. Access Control and Information Flows, Goryachaya liniya – Telekom, Moscow, 2013, 338 pp. (in Russian)
[3] Burenin P. V., Devyanin P. N., Lebedenko E. V., et al., Security of Operating System Astra Linux Special Edition, Goryachaya liniya – Telekom, Moscow, 2016, 312 pp. (in Russian)
[4] Devyanin P. N., “About results of design hierarchical representation of MROSL DP-model”, Prikladnaya Diskretnaya Matematika. Prilozhenie, 2016, no. 9, 83–87 (in Russian) | DOI
[5] Operating System Astra Linux, , 2017 www.astralinux.com
[6] Astra Linux, , 2017 ru.wikipedia.org/wiki/Astra_Linux
[7] Telezhnikov V. Y., “System state transformation rules in DP-model of access control in computer networks based on operating systems of Linux”, Prikladnaya Diskretnaya Matematika, 2016, no. 1(31), 67–85 (in Russian) | DOI | MR
[8] Armando A., Ranise S., “Automated and efficient analysis of role-based access control with attributes”, LNCS, 7371, 2012, 25–40
[9] Kuijper W., Ermolaev V., “Sorting out role based access control”, Proc. SACMAT'14, ACM, N.Y., 2014, 63–74
[10] Devyanin P. N., “Implementation of a non-degenerate lattice integrity levels within the hierarchical representation of MROSL DP-model”, Prikladnaya Diskretnaya Matematika. Prilozhenie, 2017, no. 10, 111–114 (in Russian) | DOI