Abstract:
The base role DP-model of access control and information flows in operating systems is presented. In comparison with BR DP-model this one includes registration records of users, entities and parameters associated with subjects-sessions or roles, mandatory integrity control and actual access subject-sessions. The article focuses basic attention on changes in conditions and results of application of transformation rules for states. It is proved that the only monotonous transformation rules are sufficient for the analysis of conditions for role access rights transfer, access reception and information flows realization.
Keywords:computer security, role DP-model, operating system.