The Influence Graph and Elementary Operators of the Role-based Security Policy
For research of the role-based access control system the concept of the influence graph on a role is entered and the full set of the elementary operators for transformation of the role graph is defined.
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2011-03-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/649 |
_version_ | 1797724322409742336 |
---|---|
author | S. V. Belim N. F. Bogachenko |
author_facet | S. V. Belim N. F. Bogachenko |
author_sort | S. V. Belim |
collection | DOAJ |
description | For research of the role-based access control system the concept of the influence graph on a role is entered and the full set of the elementary operators for transformation of the role graph is defined. |
first_indexed | 2024-03-12T10:15:43Z |
format | Article |
id | doaj.art-55e89f5fa8b649ab96c3a622e11152ae |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T10:15:43Z |
publishDate | 2011-03-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-55e89f5fa8b649ab96c3a622e11152ae2023-09-02T10:29:14ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362011-03-011817577639The Influence Graph and Elementary Operators of the Role-based Security PolicyS. V. BelimN. F. BogachenkoFor research of the role-based access control system the concept of the influence graph on a role is entered and the full set of the elementary operators for transformation of the role graph is defined.https://bit.mephi.ru/index.php/bit/article/view/649role-based security policyhierarchy of roleselementary operators |
spellingShingle | S. V. Belim N. F. Bogachenko The Influence Graph and Elementary Operators of the Role-based Security Policy Безопасность информационных технологий role-based security policy hierarchy of roles elementary operators |
title | The Influence Graph and Elementary Operators of the Role-based Security Policy |
title_full | The Influence Graph and Elementary Operators of the Role-based Security Policy |
title_fullStr | The Influence Graph and Elementary Operators of the Role-based Security Policy |
title_full_unstemmed | The Influence Graph and Elementary Operators of the Role-based Security Policy |
title_short | The Influence Graph and Elementary Operators of the Role-based Security Policy |
title_sort | influence graph and elementary operators of the role based security policy |
topic | role-based security policy hierarchy of roles elementary operators |
url | https://bit.mephi.ru/index.php/bit/article/view/649 |
work_keys_str_mv | AT svbelim theinfluencegraphandelementaryoperatorsoftherolebasedsecuritypolicy AT nfbogachenko theinfluencegraphandelementaryoperatorsoftherolebasedsecuritypolicy AT svbelim influencegraphandelementaryoperatorsoftherolebasedsecuritypolicy AT nfbogachenko influencegraphandelementaryoperatorsoftherolebasedsecuritypolicy |