RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2014 Issue 7, Pages 82–85 (Mi pdma140)

This article is cited in 1 paper

Mathematical Foundations of Computer Security

Security conditions for information flows by memory within the MROSL DP-model

P. N. Devyanin

Moscow

Abstract: Some sufficient conditions for security of information flows by memory are analysed within a mandatory entity-role security model of access and information flows control in OS Linux set (MROSL DP-model). The implementation of this conditions provides, firstly, a mandatory integrity control (MIC) preventing any modification (via a proper information flow by memory) of entities with a certain integrity level by a subject-session with a small integrity level, and, secondly, a mandatory access control (MAC) preventing information flows by memory from entities with a high level of confidentiality to entities with a low level of confidentiality.

Keywords: computer security, formal model, information flow, access control.

UDC: 004.94



© Steklov Math. Inst. of RAS, 2026