Prikladnaya Diskretnaya Matematika. Supplement
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat. Suppl.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika. Supplement, 2016, Issue 9, Pages 83–87
DOI: https://doi.org/10.17223/2226308X/9/32
(Mi pdma265)
 

This article is cited in 3 scientific papers (total in 3 papers)

Mathematical Foundations of Computer Security

About results of designing hierarchical representation of MROSL DP-model

P. N. Devyanin

Moscow
Full-text PDF (677 kB) Citations (3)
References:
Abstract: This article describes new approach to the hierarchical representation of mandatory entity-role DP-model of secure access and information flows control in OS of Linux set (MROSL DP-model). Existing “monolithic” description of MROSL DP-model is the basis of the access control mechanism in secure OS Astra Linux Special Edition. However, “monolithic” description of MROSL DP-model has considerable size and complexity. It is inconvenient for scientific analysis, verification and further development, as well as for its direct application in OS Astra Linux Special Edition. For this reason, a hierarchical representation of MROSL DP-model is completely revised, and we can describe it through its levels. Thus, each lower level of MROSL DP-model is an abstract system, whose elements are independent of the new elements belonging to a higher level of MROSL DP-model. When it is necessary, a higher level inherits, corrects or complements the lower level elements. There are four levels in this hierarchical representation of MROSL DP-model. First level corresponds to role-based access control (RBAC), second level – RBAC and mandatory integrity control (MIC), third level – RBAC, MIC and mandatory access control (MAC) with information flows by memory, and fourth level – RBAC, MIC and MAC with information flows by memory and by time. New levels of lateral “branches” may be added to MROSL DP-model in the future. Some alternative levels can be: alternative third level – RBAC, MIC and a model of hypervisor, or alternative fourth level – RBAC, MIC, MAC with information flows by memory and a model of RBAC in a network.
Keywords: computer security, formal model, hierarchical description, Linux.
Document Type: Article
UDC: 004.94
Language: Russian
Citation: P. N. Devyanin, “About results of designing hierarchical representation of MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2016, no. 9, 83–87
Citation in format AMSBIB
\Bibitem{Dev16}
\by P.~N.~Devyanin
\paper About results of designing hierarchical representation of MROSL DP-model
\jour Prikl. Diskr. Mat. Suppl.
\yr 2016
\issue 9
\pages 83--87
\mathnet{http://mi.mathnet.ru/pdma265}
\crossref{https://doi.org/10.17223/2226308X/9/32}
Linking options:
  • https://www.mathnet.ru/eng/pdma265
  • https://www.mathnet.ru/eng/pdma/y2016/i9/p83
  • This publication is cited in the following 3 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Prikladnaya Diskretnaya Matematika. Supplement
    Statistics & downloads:
    Abstract page:334
    Full-text PDF :136
    References:41
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024