Persons
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
 
Devyanin, Petr Nikolaevich

Statistics Math-Net.Ru
Total publications: 31
Scientific articles: 31

Number of views:
This page:3640
Abstract pages:16238
Full texts:7252
References:1307
Associate professor
Doctor of technical sciences
E-mail: ,

https://www.mathnet.ru/eng/person43578
List of publications on Google Scholar
List of publications on ZentralBlatt
https://orcid.org/0000-0003-2561-794X

Publications in Math-Net.Ru Citations
2024
1. P. N. Devyanin, “On the development of the draft standard GOST R “information protection. Formal access control model. Part 3. Recommendations on development””, Proceedings of ISP RAS, 36:3 (2024),  63–82  mathnet
2023
2. P. N. Devyanin, “The results of reworking the levels of role-based access control and mandatory integrity control of the formal model of access control in Astra Linux”, Proceedings of ISP RAS, 35:5 (2023),  7–22  mathnet
2022
3. M. A. Leonova, P. N. Devyanin, “Comparison of methods for modeling access control in OS and DBMS in Event-B for the purpose of their verification with Rodin and ProB tools”, Prikl. Diskr. Mat. Suppl., 2022, no. 15,  90–99  mathnet
4. A. O. Kokorin, S. D. Tievskiy, P. N. Devyanin, “Methods for deductive verification of C code using AstraVer Toolset”, Prikl. Diskr. Mat. Suppl., 2022, no. 15,  80–90  mathnet
5. V. V. Egorova, A. S. Panov, V. Yu. Telezhnikov, P. N. Devyanin, “Approaches for improving the efficiency of protected OS components fuzzing”, Proceedings of ISP RAS, 34:4 (2022),  21–34  mathnet
2021
6. P. N. Devyanin, M. A. Leonova, “The techniques of formalization of OS Astra Linux Special Edition access control model using Event-B formal method for verification using Rodin and ProB”, Prikl. Diskr. Mat., 2021, no. 52,  83–96  mathnet 4
7. P. N. Devyanin, M. A. Leonova, “About methods of developing consistent description of the MROSL DP-model for OS and DBMS for its verification with Rodin and ProB tools”, Prikl. Diskr. Mat. Suppl., 2021, no. 14,  126–132  mathnet 1
8. P. N. Devyanin, V. Yu. Telezhnikov, A. V. Khoroshilov, “Building a methodology for secure system software development on the example of operating systems”, Proceedings of ISP RAS, 33:5 (2021),  25–40  mathnet 4
2020
9. P. N. Devyanin, V. V. Kuliamin, A. K. Petrenko, A. V. Khoroshilov, I. V. Shchepetkov, “Integrating RBAC, MIC, and MLS in verified hierarchical security model for operating system”, Proceedings of ISP RAS, 32:1 (2020),  7–26  mathnet 4
2019
10. P. N. Devyanin, “About modeling of MIC and MAC in PostgreSQL within framework of the MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2019, no. 12,  161–165  mathnet  elib
2018
11. P. N. Devyanin, “The level of negative roles of the hierarchical representation of MROSL DP-model”, Prikl. Diskr. Mat., 2018, no. 39,  58–71  mathnet  elib 3
12. P. N. Devyanin, “Approaches to formal modelling access control in PostgreSQL within framework of the MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2018, no. 11,  95–99  mathnet  elib 2
2017
13. P. N. Devyanin, “Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2017, no. 10,  111–114  mathnet 2
14. P. N. Devyanin, “On the problem of representation of the formal model of security policy for operating systems”, Proceedings of ISP RAS, 29:3 (2017),  7–16  mathnet  elib 2
2016
15. P. N. Devyanin, “About results of designing hierarchical representation of MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2016, no. 9,  83–87  mathnet 3
2015
16. P. N. Devyanin, “Security violation necessary conditions for time information flows in MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2015, no. 8,  81–83  mathnet 1
2014
17. P. N. Devyanin, “Security conditions for information flows by memory within the MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2014, no. 7,  82–85  mathnet 1
2013
18. P. N. Devyanin, “System administration in MROSL DP-model”, Prikl. Diskr. Mat., 2013, no. 4(22),  22–40  mathnet 3
19. P. N. Devyanin, “Correctness of state transformation rules in MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2013, no. 6,  58–59  mathnet 2
2012
20. P. N. Devyanin, “The role DP-model of access and information flows control in operating systems of Linux sets”, Prikl. Diskr. Mat., 2012, no. 1(15),  69–90  mathnet 6
21. P. N. Devyanin, “Results of realization conditions analysis for information flows by memory in ROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2012, no. 5,  66–67  mathnet
2011
22. P. N. Devyanin, “About the role DP-model for access and information flows control in operating systems of Linux family”, Prikl. Diskr. Mat., 2011, no. supplement № 4,  42–43  mathnet
23. P. N. Devyanin, “Formation of a dictionary of terms in the theory of modeling the secure access and information flows control in computer systems”, Prikl. Diskr. Mat., 2011, no. 2(12),  17–39  mathnet 1
24. P. N. Devyanin, “Transformation rules for states in base role DP-model of access control and information flows in operating systems”, Prikl. Diskr. Mat., 2011, no. 1(11),  78–95  mathnet 3
2010
25. P. N. Devyanin, “Security analysis of systems with simple trajectories functioning within framework of the base role DP-model”, Prikl. Diskr. Mat., 2010, no. supplement № 3,  49–51  mathnet
26. P. N. Devyanin, “Security analysis of systems with simple trajectories of functioning within the base role DP-model”, Prikl. Diskr. Mat., 2010, no. 1(7),  16–36  mathnet 3
2009
27. P. N. Devyanin, “Review lection of security models of computer system”, Prikl. Diskr. Mat., 2009, no. supplement № 2,  151–190  mathnet
28. P. N. Devyanin, “Teaching the models of access and information flows management within discipline “Theoretical foundations of computer security””, Prikl. Diskr. Mat., 2009, no. supplement № 1,  39–41  mathnet
29. P. N. Devyanin, “Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows”, Prikl. Diskr. Mat., 2009, no. supplement № 1,  38–39  mathnet
30. P. N. Devyanin, “Analysis of conditions for reception of access owning within the base role DP-model of computer systems without memory information flows”, Prikl. Diskr. Mat., 2009, no. 3(5),  69–84  mathnet 3
2008
31. P. N. Devyanin, “Base role DP-model”, Prikl. Diskr. Mat., 2008, no. 1(1),  64–70  mathnet 7

Organisations
 
  Contact us:
 Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024