|
|
Publications in Math-Net.Ru
-
Testing the Astra Linux OS security subsystem based on a formalized description of the Access Control model
Proceedings of ISP RAS, 37:6(2) (2025), 21–36
-
Methods of runtime verification of industrial information security tools based on formal access control models.
Proceedings of ISP RAS, 37:3 (2025), 277–290
-
Design and development of mandatory integrity control in Astra Linux OS
Proceedings of ISP RAS, 37:2 (2025), 61–78
-
On the development of the draft standard GOST R “information protection. Formal access control model. Part 3. Recommendations on development”
Proceedings of ISP RAS, 36:3 (2024), 63–82
-
The results of reworking the levels of role-based access control and mandatory integrity control of the formal model of access control in Astra Linux
Proceedings of ISP RAS, 35:5 (2023), 7–22
-
Comparison of methods for modeling access control in OS and DBMS in Event-B for the purpose of their verification with Rodin and ProB tools
Prikl. Diskr. Mat. Suppl., 2022, no. 15, 90–99
-
Methods for deductive verification of C code using AstraVer Toolset
Prikl. Diskr. Mat. Suppl., 2022, no. 15, 80–90
-
Approaches for improving the efficiency of protected OS components fuzzing
Proceedings of ISP RAS, 34:4 (2022), 21–34
-
The techniques of formalization of OS Astra Linux Special Edition access control model using Event-B formal method for verification using Rodin and ProB
Prikl. Diskr. Mat., 2021, no. 52, 83–96
-
About methods of developing consistent description of the MROSL DP-model for OS and DBMS for its verification with Rodin and ProB tools
Prikl. Diskr. Mat. Suppl., 2021, no. 14, 126–132
-
Building a methodology for secure system software development on the example of operating systems
Proceedings of ISP RAS, 33:5 (2021), 25–40
-
Integrating RBAC, MIC, and MLS in verified hierarchical security model for operating system
Proceedings of ISP RAS, 32:1 (2020), 7–26
-
About modeling of MIC and MAC in PostgreSQL within framework of the MROSL DP-model
Prikl. Diskr. Mat. Suppl., 2019, no. 12, 161–165
-
The level of negative roles of the hierarchical representation of MROSL DP-model
Prikl. Diskr. Mat., 2018, no. 39, 58–71
-
Approaches to formal modelling access control in PostgreSQL within framework of the MROSL DP-model
Prikl. Diskr. Mat. Suppl., 2018, no. 11, 95–99
-
Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model
Prikl. Diskr. Mat. Suppl., 2017, no. 10, 111–114
-
On the problem of representation of the formal model of security policy for operating systems
Proceedings of ISP RAS, 29:3 (2017), 7–16
-
About results of designing hierarchical representation of MROSL DP-model
Prikl. Diskr. Mat. Suppl., 2016, no. 9, 83–87
-
Security violation necessary conditions for time information flows in MROSL DP-model
Prikl. Diskr. Mat. Suppl., 2015, no. 8, 81–83
-
Security conditions for information flows by memory within the MROSL DP-model
Prikl. Diskr. Mat. Suppl., 2014, no. 7, 82–85
-
System administration in MROSL DP-model
Prikl. Diskr. Mat., 2013, no. 4(22), 22–40
-
Correctness of state transformation rules in MROSL DP-model
Prikl. Diskr. Mat. Suppl., 2013, no. 6, 58–59
-
The role DP-model of access and information flows control in operating systems of Linux sets
Prikl. Diskr. Mat., 2012, no. 1(15), 69–90
-
Results of realization conditions analysis for information flows by memory in ROSL DP-model
Prikl. Diskr. Mat. Suppl., 2012, no. 5, 66–67
-
About the role DP-model for access and information flows control in operating systems of Linux family
Prikl. Diskr. Mat., 2011, no. supplement № 4, 42–43
-
Formation of a dictionary of terms in the theory of modeling the secure access and information flows control in computer systems
Prikl. Diskr. Mat., 2011, no. 2(12), 17–39
-
Transformation rules for states in base role DP-model of access control and information flows in operating systems
Prikl. Diskr. Mat., 2011, no. 1(11), 78–95
-
Security analysis of systems with simple trajectories functioning within framework of the base role DP-model
Prikl. Diskr. Mat., 2010, no. supplement № 3, 49–51
-
Security analysis of systems with simple trajectories of functioning within the base role DP-model
Prikl. Diskr. Mat., 2010, no. 1(7), 16–36
-
Review lection of security models of computer system
Prikl. Diskr. Mat., 2009, no. supplement № 2, 151–190
-
Teaching the models of access and information flows management within discipline “Theoretical foundations of computer security”
Prikl. Diskr. Mat., 2009, no. supplement № 1, 39–41
-
Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows
Prikl. Diskr. Mat., 2009, no. supplement № 1, 38–39
-
Analysis of conditions for reception of access owning within the base role DP-model of computer systems without memory information flows
Prikl. Diskr. Mat., 2009, no. 3(5), 69–84
-
Base role DP-model
Prikl. Diskr. Mat., 2008, no. 1(1), 64–70
© , 2026