Prikladnaya Diskretnaya Matematika. Supplement
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat. Suppl.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika. Supplement, 2015, Issue 8, Pages 81–83
DOI: https://doi.org/10.17223/2226308X/8/30
(Mi pdma207)
 

This article is cited in 1 scientific paper (total in 1 paper)

Mathematical Foundations of Computer Security

Security violation necessary conditions for time information flows in MROSL DP-model

P. N. Devyanin

Moscow
Full-text PDF (559 kB) Citations (1)
References:
Abstract: This article presents a theorem about the security violation necessary conditions for time information flows in Linux family operating systems. The conditions are easily to implement. According to these conditions, to prevent prohibited time information flows it is necessary: 1) to eliminate containers where both the Boolean mandatory attribute CCR (Container Clearance Required) and the integrity attribute CCRI (CCR for integrity) are true; 2) to eliminate containers which include entities with less level of confidentiality; 3) to completely prohibit using entities-“holes” not saving data or use their implementation not creating time information flows. After this, for the access control security in OS Astra Linux Special Edition, it is sufficient to ensure the memory information flows security in the sense of Bell–LaPadula model and the mandatory integrity control.
Keywords: computer security, formal model, information flow.
Document Type: Article
UDC: 004.94
Language: Russian
Citation: P. N. Devyanin, “Security violation necessary conditions for time information flows in MROSL DP-model”, Prikl. Diskr. Mat. Suppl., 2015, no. 8, 81–83
Citation in format AMSBIB
\Bibitem{Dev15}
\by P.~N.~Devyanin
\paper Security violation necessary conditions for time information flows in MROSL DP-model
\jour Prikl. Diskr. Mat. Suppl.
\yr 2015
\issue 8
\pages 81--83
\mathnet{http://mi.mathnet.ru/pdma207}
\crossref{https://doi.org/10.17223/2226308X/8/30}
Linking options:
  • https://www.mathnet.ru/eng/pdma207
  • https://www.mathnet.ru/eng/pdma/y2015/i8/p81
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Prikladnaya Diskretnaya Matematika. Supplement
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2025