Abstract:
Conditions and results of application are analysed for state transformation rules in mandatory entity-role security model of access and information flows control in OS of Linux set (MROSL DP-model). The correctness of the rules is considered with regard to requirements of mandatory access control (MAC), mandatory integrity control (MIC) and role-based access control (RBAC).