FIELD: physics, computer engineering.
SUBSTANCE: invention relates to computer engineering. A method of securing information flow in secure information systems with mandatory and role-based access control, which includes presenting a secure information system within a formal security model of logic mandatory and role-based control of access and information flow in which roles are realised by substance-containers to which system subjects are granted access for ownership, reading or writing; each role is assigned a confidentiality level which does not exceed the confidentiality level of roles to which said role is subordinate in a hierarchy; a subject is granted access to a role only if the subject has the respective effective access right to said role; the subject is allowed to alter access rights to substances possessed by the role only when the subject has a write access to the role; a subject is allowed to alter the access rights to a role only when the subject has an ownership access to said role.
EFFECT: preventing secure information system violator subjects from using role parameters.
3 cl, 2 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD OF PREDICTING AND EVALUATING SAFETY OF ACCESSIBLE STATES OF PROTECTED INFORMATION SYSTEMS | 2008 |
|
RU2394271C1 |
SYSTEM WITH ROLE-BASED ACCESS CONTROL TO THE ORGANIZATION OF THE OPERATIONAL MAINTENANCE OF BUILDINGS AND STRUCTURES | 2022 |
|
RU2801374C1 |
SYSTEM OF PROTECTION OF INFORMATION FROM UNAUTHORIZED ACCESS | 2017 |
|
RU2648942C1 |
METHOD OF AUTOMATIC ASSESSMENT OF SECURITY OF INFORMATION SYSTEMS AND SYSTEM FOR REALISATION THEREOF | 2008 |
|
RU2379754C1 |
DEVICE FOR MANDATORY ACCESS TO ELECTRONIC INFORMATION RESOURCES | 2022 |
|
RU2792790C1 |
METHOD OF CONTROL OF FILES ACCESS | 2016 |
|
RU2630163C1 |
METHOD FOR VERIFYING FORMAL AUTOMATE MODEL OF BEHAVIOR OF SOFTWARE SYSTEM | 2017 |
|
RU2682003C1 |
METHOD FOR ADAPTIVE PARAMETRIC CONTROL OF SAFETY OF INFORMATION SYSTEMS AND SYSTEM FOR REALISING SAID METHOD | 2008 |
|
RU2399091C2 |
METHOD FOR CENTRALISED CONTROL OF ACCESS OF CONTROL SYSTEMS TO ACTIVE NETWORK EQUIPMENT IN DISTRIBUTED COMPUTER SYSTEMS AND SYSTEM THEREFOR | 2013 |
|
RU2580815C2 |
METHOD OF CONTROLLING ACCESS TO INFORMATION RESOURCES OF COMPUTER NETWORKS OF DIFFERENT LEVELS OF CONFIDENTIALITY | 2013 |
|
RU2541170C2 |
Authors
Dates
2014-08-20—Published
2012-11-01—Filed