Prikladnaya Diskretnaya Matematika
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika, 2016, Number 1(31), Pages 67–85
DOI: https://doi.org/10.17223/20710410/31/7
(Mi pdm539)
 

This article is cited in 1 scientific paper (total in 1 paper)

Mathematical Foundations of Computer Security

System state transformation rules in DP-model of access control in computer networks based on operating systems of Linux

V. Y. Telezhnikov

EMA IS, Moscow, Russia
Full-text PDF (804 kB) Citations (1)
References:
Abstract: When modern computer systems (CS) are created, a big attention is paid to theoretical explanation of their access control security mechanisms. For this aim, some formal models are built and mandatory MROSL DP-model is the most developed of them. However, it is important to consider peculiarities of logical access control organization in computer networks and the existence of different security policies of network stations. MROSL DP-model and other models known to the author do not take this into account. Besides, it is necessary to provide flexible specification of access control to network resources in the context of theoretical models of logical access control in computer systems including hundreds and thousands users. The simple mechanism of access control administration is also needed. The author is building new mandatory object-role access control DP-model for the computer systems based on OS of Linux family (MROCS DP-model) relying on MROSL DP-model in order to consider mentioned peculiarities. Existing de-jure rules of system state transformation are refined and new ones are specified in the context of this model for the purpose of taking into account peculiarities of functioning CS under consideration. These changes allow to describe in details specifications of access control mechanisms. Besides, the correctness of these rules with respect to mandatory and role-based access control requirements is shown, so it makes possible to construct theory-based network security subsystem of CS. De-jure rules of state transformation in MROCS DP-model connected with the organization of logical access control in the context of CS are directed to realization in special operating system Astra Linux Special Edition.
Keywords: computer networks, operating systems of Linux, DP-model.
Bibliographic databases:
Document Type: Article
UDC: 004.94
Language: Russian
Citation: V. Y. Telezhnikov, “System state transformation rules in DP-model of access control in computer networks based on operating systems of Linux”, Prikl. Diskr. Mat., 2016, no. 1(31), 67–85
Citation in format AMSBIB
\Bibitem{Tel16}
\by V.~Y.~Telezhnikov
\paper System state transformation rules in DP-model of access control in computer networks based on operating systems of Linux
\jour Prikl. Diskr. Mat.
\yr 2016
\issue 1(31)
\pages 67--85
\mathnet{http://mi.mathnet.ru/pdm539}
\crossref{https://doi.org/10.17223/20710410/31/7}
Linking options:
  • https://www.mathnet.ru/eng/pdm539
  • https://www.mathnet.ru/eng/pdm/y2016/i1/p67
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Прикладная дискретная математика
    Statistics & downloads:
    Abstract page:211
    Full-text PDF :82
    References:29
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024