Abstract:
Necessary and sufficient conditions for the reception by untrusted user sessions of access owning to trusted user sessions are stated within the base role DP-model of computer systems with the role management of access. It is supposed in the consideration that any number of user sessions cooperate, and they do not get access owning to each other with the use of memory information flows to entities functionally associated with the user sessions.