This article represents a base role DP-model constructed on the basis of group rolebasedaccess control (RBAC) models and DP-models computer systems with discretionary or mandatory access control. The singularitiesof functioning modern computer systems take into account in base role DP-model including distinctions in conditionsof functioning and the cooperation of trusted and nontrusted user sessions, in conditions of realization of information flows bymemory or by time, and also possibility of getting the nontrusted session control above the trusted session while realization of informationflows by memory on entity which is functionally associated with the trusted session. Monotonous and nonmonotonicrules of transformation of conditions of system are described in details and analyzed while sets of actual roles, rights of accessand possible actions of the nontrusted sessions are used. Sufficient conditions of access rights transfer roles are substantiated byuser sessions
Download file
Counter downloads: 71
- Title BASE ROLE DP-MODEL.
- Headline BASE ROLE DP-MODEL.
- Publesher
Tomsk State University
- Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 1(1)
- Date:
- DOI
Keywords
ролевая модель , математические модели безопасности , компьютерная безопасность Authors
References
Sandhu R. Role-Based Access Control, Advanced in Computers // Academic Press. 1998. V. 46.
Девянин П.Н. Анализ безопасности управления доступом и информационными потоками в компьютерных системах. М.: Радио и связь, 2006. 176 с.
Bishop M. Computer Security: Art and Science. 2002. 1084 p.
Девянин П.Н. Модели безопасности компьютерных систем: Учеб. пособие для студ. высш. учеб. заведений. М.: Издательский центр «Академия», 2005. 144 с.

BASE ROLE DP-MODEL. | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2008. № 1(1).
Download full-text version
Download fileCounter downloads: 672