The Influence Graph and Elementary Operators of the Role-based Security Policy

For research of the role-based access control system the concept of the influence graph on a role is entered and the full set of the elementary operators for transformation of the role graph is defined.

Bibliographic Details
Main Authors: S. V. Belim, N. F. Bogachenko
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2011-03-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/649
_version_ 1797724322409742336
author S. V. Belim
N. F. Bogachenko
author_facet S. V. Belim
N. F. Bogachenko
author_sort S. V. Belim
collection DOAJ
description For research of the role-based access control system the concept of the influence graph on a role is entered and the full set of the elementary operators for transformation of the role graph is defined.
first_indexed 2024-03-12T10:15:43Z
format Article
id doaj.art-55e89f5fa8b649ab96c3a622e11152ae
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T10:15:43Z
publishDate 2011-03-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-55e89f5fa8b649ab96c3a622e11152ae2023-09-02T10:29:14ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362011-03-011817577639The Influence Graph and Elementary Operators of the Role-based Security PolicyS. V. BelimN. F. BogachenkoFor research of the role-based access control system the concept of the influence graph on a role is entered and the full set of the elementary operators for transformation of the role graph is defined.https://bit.mephi.ru/index.php/bit/article/view/649role-based security policyhierarchy of roleselementary operators
spellingShingle S. V. Belim
N. F. Bogachenko
The Influence Graph and Elementary Operators of the Role-based Security Policy
Безопасность информационных технологий
role-based security policy
hierarchy of roles
elementary operators
title The Influence Graph and Elementary Operators of the Role-based Security Policy
title_full The Influence Graph and Elementary Operators of the Role-based Security Policy
title_fullStr The Influence Graph and Elementary Operators of the Role-based Security Policy
title_full_unstemmed The Influence Graph and Elementary Operators of the Role-based Security Policy
title_short The Influence Graph and Elementary Operators of the Role-based Security Policy
title_sort influence graph and elementary operators of the role based security policy
topic role-based security policy
hierarchy of roles
elementary operators
url https://bit.mephi.ru/index.php/bit/article/view/649
work_keys_str_mv AT svbelim theinfluencegraphandelementaryoperatorsoftherolebasedsecuritypolicy
AT nfbogachenko theinfluencegraphandelementaryoperatorsoftherolebasedsecuritypolicy
AT svbelim influencegraphandelementaryoperatorsoftherolebasedsecuritypolicy
AT nfbogachenko influencegraphandelementaryoperatorsoftherolebasedsecuritypolicy