|
|
Publications in Math-Net.Ru |
Citations |
|
2024 |
1. |
P. N. Devyanin, “On the development of the draft standard GOST R “information protection. Formal access control model. Part 3. Recommendations on development””, Proceedings of ISP RAS, 36:3 (2024), 63–82 |
|
2023 |
2. |
P. N. Devyanin, “The results of reworking the levels of role-based access control and mandatory integrity control of the formal model of access control in Astra Linux”, Proceedings of ISP RAS, 35:5 (2023), 7–22 |
|
2022 |
3. |
M. A. Leonova, P. N. Devyanin, “Comparison of methods for modeling access control in OS and DBMS in Event-B for the purpose of their verification with Rodin and ProB tools”, Prikl. Diskr. Mat. Suppl., 2022, no. 15, 90–99 |
4. |
A. O. Kokorin, S. D. Tievskiy, P. N. Devyanin, “Methods for deductive verification of C code using AstraVer Toolset”, Prikl. Diskr. Mat. Suppl., 2022, no. 15, 80–90 |
5. |
V. V. Egorova, A. S. Panov, V. Yu. Telezhnikov, P. N. Devyanin, “Approaches for improving the efficiency of protected OS components fuzzing”, Proceedings of ISP RAS, 34:4 (2022), 21–34 |
|
2021 |
6. |
P. N. Devyanin, M. A. Leonova, “The techniques of formalization of OS Astra Linux Special Edition access control model using Event-B formal method for verification using Rodin and ProB”, Prikl. Diskr. Mat., 2021, no. 52, 83–96 |
4
|
7. |
P. N. Devyanin, M. A. Leonova, “About methods of developing consistent description of the MROSL DP-model for OS and DBMS for its verification with Rodin and ProB tools”, Prikl. Diskr. Mat. Suppl., 2021, no. 14, 126–132 |
1
|
8. |
P. N. Devyanin, V. Yu. Telezhnikov, A. V. Khoroshilov, “Building a methodology for secure system software development on the example of operating systems”, Proceedings of ISP RAS, 33:5 (2021), 25–40 |
4
|
|
2020 |
9. |
P. N. Devyanin, V. V. Kuliamin, A. K. Petrenko, A. V. Khoroshilov, I. V. Shchepetkov, “Integrating RBAC, MIC, and MLS in verified hierarchical security model for operating system”, Proceedings of ISP RAS, 32:1 (2020), 7–26 |
4
|
|
2019 |
10. |
P. N. Devyanin, “About modeling of MIC and MAC in PostgreSQL within framework of the MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2019, no. 12, 161–165 |
|
2018 |
11. |
P. N. Devyanin, “The level of negative roles of the hierarchical representation of MROSL DP-model”, Prikl. Diskr. Mat., 2018, no. 39, 58–71 |
3
|
12. |
P. N. Devyanin, “Approaches to formal modelling access control in PostgreSQL within framework of the MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2018, no. 11, 95–99 |
2
|
|
2017 |
13. |
P. N. Devyanin, “Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2017, no. 10, 111–114 |
2
|
14. |
P. N. Devyanin, “On the problem of representation of the formal model of security policy for operating systems”, Proceedings of ISP RAS, 29:3 (2017), 7–16 |
2
|
|
2016 |
15. |
P. N. Devyanin, “About results of designing hierarchical representation of MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2016, no. 9, 83–87 |
3
|
|
2015 |
16. |
P. N. Devyanin, “Security violation necessary conditions for time information flows in MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2015, no. 8, 81–83 |
1
|
|
2014 |
17. |
P. N. Devyanin, “Security conditions for information flows by memory within the MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2014, no. 7, 82–85 |
1
|
|
2013 |
18. |
P. N. Devyanin, “System administration in MROSL DP-model”, Prikl. Diskr. Mat., 2013, no. 4(22), 22–40 |
3
|
19. |
P. N. Devyanin, “Correctness of state transformation rules in MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2013, no. 6, 58–59 |
2
|
|
2012 |
20. |
P. N. Devyanin, “The role DP-model of access and information flows control in operating systems of Linux sets”, Prikl. Diskr. Mat., 2012, no. 1(15), 69–90 |
6
|
21. |
P. N. Devyanin, “Results of realization conditions analysis for information flows by memory in ROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2012, no. 5, 66–67 |
|
2011 |
22. |
P. N. Devyanin, “About the role DP-model for access and information flows control in operating systems of Linux family”, Prikl. Diskr. Mat., 2011, no. supplement № 4, 42–43 |
23. |
P. N. Devyanin, “Formation of a dictionary of terms in the theory of modeling the secure access and information flows control in computer systems”, Prikl. Diskr. Mat., 2011, no. 2(12), 17–39 |
1
|
24. |
P. N. Devyanin, “Transformation rules for states in base role DP-model of access control and information flows in operating systems”, Prikl. Diskr. Mat., 2011, no. 1(11), 78–95 |
3
|
|
2010 |
25. |
P. N. Devyanin, “Security analysis of systems with simple trajectories functioning within framework of the base role DP-model”, Prikl. Diskr. Mat., 2010, no. supplement № 3, 49–51 |
26. |
P. N. Devyanin, “Security analysis of systems with simple trajectories of functioning within the base role DP-model”, Prikl. Diskr. Mat., 2010, no. 1(7), 16–36 |
3
|
|
2009 |
27. |
P. N. Devyanin, “Review lection of security models of computer system”, Prikl. Diskr. Mat., 2009, no. supplement № 2, 151–190 |
28. |
P. N. Devyanin, “Teaching the models of access and information flows management within discipline “Theoretical foundations of computer security””, Prikl. Diskr. Mat., 2009, no. supplement № 1, 39–41 |
29. |
P. N. Devyanin, “Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows”, Prikl. Diskr. Mat., 2009, no. supplement № 1, 38–39 |
30. |
P. N. Devyanin, “Analysis of conditions for reception of access owning within the base role DP-model of computer systems without memory information flows”, Prikl. Diskr. Mat., 2009, no. 3(5), 69–84 |
3
|
|
2008 |
31. |
P. N. Devyanin, “Base role DP-model”, Prikl. Diskr. Mat., 2008, no. 1(1), 64–70 |
7
|
|
Organisations |
|
|
|
|