Integrating RBAC, MIC, and MLS in Verified Hierarchical Security Model for Operating System.
Petr N. DevyaninAlexey V. KhoroshilovVictor V. KuliaminAlexander K. PetrenkoIlya V. ShchepetkovPublished in: Program. Comput. Softw. (2020)
Keyphrases
- security model
- mandatory access control
- access control
- role based access control
- operating system
- access control policies
- security policies
- fine grained
- data security
- security requirements
- security analysis
- public key
- security mechanisms
- computer systems
- virtual machine
- database
- data model
- case study
- microsoft windows
- operating environment
- databases