RUS  ENG
Full version
PEOPLE

Devyanin Petr Nikolaevich

Publications in Math-Net.Ru

  1. Testing the Astra Linux OS security subsystem based on a formalized description of the Access Control model

    Proceedings of ISP RAS, 37:6(2) (2025),  21–36
  2. Methods of runtime verification of industrial information security tools based on formal access control models.

    Proceedings of ISP RAS, 37:3 (2025),  277–290
  3. Design and development of mandatory integrity control in Astra Linux OS

    Proceedings of ISP RAS, 37:2 (2025),  61–78
  4. On the development of the draft standard GOST R “information protection. Formal access control model. Part 3. Recommendations on development”

    Proceedings of ISP RAS, 36:3 (2024),  63–82
  5. The results of reworking the levels of role-based access control and mandatory integrity control of the formal model of access control in Astra Linux

    Proceedings of ISP RAS, 35:5 (2023),  7–22
  6. Comparison of methods for modeling access control in OS and DBMS in Event-B for the purpose of their verification with Rodin and ProB tools

    Prikl. Diskr. Mat. Suppl., 2022, no. 15,  90–99
  7. Methods for deductive verification of C code using AstraVer Toolset

    Prikl. Diskr. Mat. Suppl., 2022, no. 15,  80–90
  8. Approaches for improving the efficiency of protected OS components fuzzing

    Proceedings of ISP RAS, 34:4 (2022),  21–34
  9. The techniques of formalization of OS Astra Linux Special Edition access control model using Event-B formal method for verification using Rodin and ProB

    Prikl. Diskr. Mat., 2021, no. 52,  83–96
  10. About methods of developing consistent description of the MROSL DP-model for OS and DBMS for its verification with Rodin and ProB tools

    Prikl. Diskr. Mat. Suppl., 2021, no. 14,  126–132
  11. Building a methodology for secure system software development on the example of operating systems

    Proceedings of ISP RAS, 33:5 (2021),  25–40
  12. Integrating RBAC, MIC, and MLS in verified hierarchical security model for operating system

    Proceedings of ISP RAS, 32:1 (2020),  7–26
  13. About modeling of MIC and MAC in PostgreSQL within framework of the MROSL DP-model

    Prikl. Diskr. Mat. Suppl., 2019, no. 12,  161–165
  14. The level of negative roles of the hierarchical representation of MROSL DP-model

    Prikl. Diskr. Mat., 2018, no. 39,  58–71
  15. Approaches to formal modelling access control in PostgreSQL within framework of the MROSL DP-model

    Prikl. Diskr. Mat. Suppl., 2018, no. 11,  95–99
  16. Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model

    Prikl. Diskr. Mat. Suppl., 2017, no. 10,  111–114
  17. On the problem of representation of the formal model of security policy for operating systems

    Proceedings of ISP RAS, 29:3 (2017),  7–16
  18. About results of designing hierarchical representation of MROSL DP-model

    Prikl. Diskr. Mat. Suppl., 2016, no. 9,  83–87
  19. Security violation necessary conditions for time information flows in MROSL DP-model

    Prikl. Diskr. Mat. Suppl., 2015, no. 8,  81–83
  20. Security conditions for information flows by memory within the MROSL DP-model

    Prikl. Diskr. Mat. Suppl., 2014, no. 7,  82–85
  21. System administration in MROSL DP-model

    Prikl. Diskr. Mat., 2013, no. 4(22),  22–40
  22. Correctness of state transformation rules in MROSL DP-model

    Prikl. Diskr. Mat. Suppl., 2013, no. 6,  58–59
  23. The role DP-model of access and information flows control in operating systems of Linux sets

    Prikl. Diskr. Mat., 2012, no. 1(15),  69–90
  24. Results of realization conditions analysis for information flows by memory in ROSL DP-model

    Prikl. Diskr. Mat. Suppl., 2012, no. 5,  66–67
  25. About the role DP-model for access and information flows control in operating systems of Linux family

    Prikl. Diskr. Mat., 2011, no. supplement № 4,  42–43
  26. Formation of a dictionary of terms in the theory of modeling the secure access and information flows control in computer systems

    Prikl. Diskr. Mat., 2011, no. 2(12),  17–39
  27. Transformation rules for states in base role DP-model of access control and information flows in operating systems

    Prikl. Diskr. Mat., 2011, no. 1(11),  78–95
  28. Security analysis of systems with simple trajectories functioning within framework of the base role DP-model

    Prikl. Diskr. Mat., 2010, no. supplement № 3,  49–51
  29. Security analysis of systems with simple trajectories of functioning within the base role DP-model

    Prikl. Diskr. Mat., 2010, no. 1(7),  16–36
  30. Review lection of security models of computer system

    Prikl. Diskr. Mat., 2009, no. supplement № 2,  151–190
  31. Teaching the models of access and information flows management within discipline “Theoretical foundations of computer security”

    Prikl. Diskr. Mat., 2009, no. supplement № 1,  39–41
  32. Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows

    Prikl. Diskr. Mat., 2009, no. supplement № 1,  38–39
  33. Analysis of conditions for reception of access owning within the base role DP-model of computer systems without memory information flows

    Prikl. Diskr. Mat., 2009, no. 3(5),  69–84
  34. Base role DP-model

    Prikl. Diskr. Mat., 2008, no. 1(1),  64–70


© Steklov Math. Inst. of RAS, 2026