The analysis of hidden channels of information leakage with respect to
r...
To design a discretionary access control policy, a technique is proposed...
The problem of optimal authorization of a user in a system with a role-b...
During the development of the security subsystem of modern information
s...