RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2015 Issue 8, Pages 81–83 (Mi pdma207)

This article is cited in 1 paper

Mathematical Foundations of Computer Security

Security violation necessary conditions for time information flows in MROSL DP-model

P. N. Devyanin

Moscow

Abstract: This article presents a theorem about the security violation necessary conditions for time information flows in Linux family operating systems. The conditions are easily to implement. According to these conditions, to prevent prohibited time information flows it is necessary: 1) to eliminate containers where both the Boolean mandatory attribute CCR (Container Clearance Required) and the integrity attribute CCRI (CCR for integrity) are true; 2) to eliminate containers which include entities with less level of confidentiality; 3) to completely prohibit using entities-“holes” not saving data or use their implementation not creating time information flows. After this, for the access control security in OS Astra Linux Special Edition, it is sufficient to ensure the memory information flows security in the sense of Bell–LaPadula model and the mandatory integrity control.

Keywords: computer security, formal model, information flow.

UDC: 004.94

DOI: 10.17223/2226308X/8/30



© Steklov Math. Inst. of RAS, 2026