Prikladnaya Diskretnaya Matematika. Supplement
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat. Suppl.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika. Supplement, 2017, Issue 10, Pages 111–114
DOI: https://doi.org/10.17223/2226308X/10/44
(Mi pdma320)
 

This article is cited in 2 scientific papers (total in 2 papers)

Mathematical Foundations of Computer Security

Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model

P. N. Devyanin

Moscow
Full-text PDF (585 kB) Citations (2)
References:
Abstract: This article presents a new level of the hierarchical representation of the mandatory entity-role DP-model of access and information flows control in an OS of Linux set (MROSL DP-model). This model is a scientific base for the development and implementation of the secure access control in OS Astra Linux Special Edition. Four levels were earlier defined within the hierarchical representation of MROSL DP-model. Each lower level is an abstract system with elements which are independent of the new elements belonging to a higher level of the model. When is needed, a higher level inherits, corrects or complements lower level elements. The first level corresponds to the role-based access control (RBAC), the second level – RBAC and mandatory integrity control (MIC), the third level – RBAC, MIC and mandatory access control (MAC) with the information flows by memory, and the fourth level – RBAC, MIC and MAC with the information flows by memory and by time. The fifth level is the new level of the model. It corresponds to RBAC and MIC with the non-degenerate lattice of integrity labels. Only two integrity labels in the lattice are situated at the second level of the model: high label – for the system and privileged users and low label – for non-privileged users. Therefore, the fifth level of the model is essentially an alternative third level including an arbitrary set of integrity labels. The aim of the new level is to produce the modelling MIC by using the technology of the virtualization or as a part of a network domain architecture.
Keywords: computer security, formal model, mandatory integrity control.
Document Type: Article
UDC: 004.94
Language: Russian
Citation: P. N. Devyanin, “Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2017, no. 10, 111–114
Citation in format AMSBIB
\Bibitem{Dev17}
\by P.~N.~Devyanin
\paper Implementation of a~non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model
\jour Prikl. Diskr. Mat. Suppl.
\yr 2017
\issue 10
\pages 111--114
\mathnet{http://mi.mathnet.ru/pdma320}
\crossref{https://doi.org/10.17223/2226308X/10/44}
Linking options:
  • https://www.mathnet.ru/eng/pdma320
  • https://www.mathnet.ru/eng/pdma/y2017/i10/p111
  • This publication is cited in the following 2 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Prikladnaya Diskretnaya Matematika. Supplement
    Statistics & downloads:
    Abstract page:225
    Full-text PDF :91
    References:29
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024