Article

Article title MANDATORY ACCESS CONTROL THROUGH DIAGRAMS OF RADICALS
Authors O.M. Lepeshkin, R.S. Gappoev
Section SECTION II. THE ANALYSIS OF SECURITY AND PROTECTION OF INFORMATION SYSTEMS AND OBJECTS
Month, Year 12, 2011 @en
Index UDC 004.05
DOI
Abstract Research in the field of information and computer technology shows that in the developed world have long formed the infrastructure of information security in data processing systems, which need to be considered for real-time systems. The introduction of the system requirements of international standards and principles of the process approach to management leads to a change in the principles of security controls and requires a review of the main approaches to the construction of security systems in the dynamics. Consequently, this paper analyzes the basic models of access control based on the mandatory security policy, "Bell - LaPadula," and "Chinese walls" for real-time systems. The basic flaws and contradictions (unclassification objects) of these models that could potentially violate the security of the system. To address these issues is invited to consider the model of providing access to truths based on the "authority of the subject" and "admission authority for the object." To implement this method, it was decided to use the medium of radicals, which are based predicates.

Download PDF

Keywords Security policy; the mandatory models; the mandatory access; control of integrity; dia- grams of radicals.
References 1. LaPadula L., Bell D. Secure Computer Systems: Mathematical Foundation, ESD-TR-73-278, V.1, MITRE Corporation.
2. LaPadula L., Bell D. Secure Computer Systems: Mathematical Foundation, ESD-TR-73-278, V.II, MITRE Corporation.
3. Пирогов М.В. Методика обеспечения информационно-системной безопасности сложных систем на основе математического моделирования проблемной области таких систем схемами радикалов: диссертация. – М.: Наука, 2008. – 152 с.
4. Landwehr C. Formal Models for Computer Security // ACM Computing Surveys. – 1984. – Vol. 13. – № 3. – 80 p.
5. Гайдамакин Н.А. Разграничение доступа к информации в компьютерных системах. – Изд-во Уральского ун-та, 2003. – 328 с.
6. Лепешкин О.М., Гаппоев Р.С. Анализ моделей мандатного разграничения доступа для систем реального времени // Научно-технические ведомости. – СПб.: СПб ГПУ, 2011. – № 3. – C. 56-64.

Comments are closed.