RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika // Archive

Prikl. Diskr. Mat., 2011 Number 1(11), Pages 78–95 (Mi pdm259)

This article is cited in 3 papers

Mathematical Foundations of Computer Security

Transformation rules for states in base role DP-model of access control and information flows in operating systems

P. N. Devyanin

Institute of Cryptography, Communications and Informatics, Academy of Federal Security Service of Russian Federation, Moscow, Russia

Abstract: The base role DP-model of access control and information flows in operating systems is presented. In comparison with BR DP-model this one includes registration records of users, entities and parameters associated with subjects-sessions or roles, mandatory integrity control and actual access subject-sessions. The article focuses basic attention on changes in conditions and results of application of transformation rules for states. It is proved that the only monotonous transformation rules are sufficient for the analysis of conditions for role access rights transfer, access reception and information flows realization.

Keywords: computer security, role DP-model, operating system.

UDC: 004.94



© Steklov Math. Inst. of RAS, 2025