|
Prikladnaya Diskretnaya Matematika, 2012, Number 1(15), Pages 69–90
(Mi pdm356)
|
|
|
|
This article is cited in 6 scientific papers (total in 6 papers)
Mathematical Foundations of Computer Security
The role DP-model of access and information flows control in operating systems of Linux sets
P. N. Devyanin Institute of Cryptography, Communications and Informatics, Moscow, Russia
Abstract:
In this article, the basic role DP-model of access and information flows control in operating systems (OS) is presented completing the role DP-model for OS of Linux set. New features of the basic role DP-model described in the article are the following: the names of entities, mandatory integrity attributes of entities-containers, and the function of de-facto ownership. The main difference of the model is the strong separation of the de-jure state transformation rules (requiring implementation in OS) and the de-facto rules (used only for the analysis of system security conditions). It is proved that the using only monotonic state transformation rules is sufficient for analysing conditions of transfering role access rights, of access to entities, and of realizing information flows in OS.
Keywords:
computer security, role DP-model, operating system Linux.
Citation:
P. N. Devyanin, “The role DP-model of access and information flows control in operating systems of Linux sets”, Prikl. Diskr. Mat., 2012, no. 1(15), 69–90
Linking options:
https://www.mathnet.ru/eng/pdm356 https://www.mathnet.ru/eng/pdm/y2012/i1/p69
|
Statistics & downloads: |
Abstract page: | 1431 | Full-text PDF : | 482 | References: | 82 | First page: | 1 |
|