Abstract:
In the paper, a model for discretionary network computer systems with vulnerabilities is proposed. The model is based on the DP-model with functionally or parametrically associated with subjects entities. It is shown how to apply this model for finding all the possible paths to violate the security policy, for representating other models designed for the same purposes by its means, and for developing it in order to verify if an untrusted entity could take the rights of a trusted entity.