. . . . . . "3358"^^ . . . . . "The HRU security model (Harrison, Ruzzo, Ullman model) is an operating system level computer security model which deals with the integrity of access rights in the system. It is an extension of the Graham-Denning model, based around the idea of a finite set of procedures being available to edit the access rights of a subject on an object . It is named after its three authors, Michael A. Harrison, Walter L. Ruzzo and Jeffrey D. Ullman. Along with presenting the model, Harrison, Ruzzo and Ullman also discussed the possibilities and limitations of proving the safety of systems using an algorithm."@en . "5161649"^^ . . . "Le mod\u00E8le HRU (du nom de ses auteurs, Michael A. Harrison, Walter L. Ruzzo et Jeffrey D. Ullman) est un mod\u00E8le de contr\u00F4le d'acc\u00E8s discr\u00E9tionnaire, \u00E0 base de matrice d'acc\u00E8s, formalis\u00E9 en 1976."@fr . "HRU (security)"@en . . . "Le mod\u00E8le HRU (du nom de ses auteurs, Michael A. Harrison, Walter L. Ruzzo et Jeffrey D. Ullman) est un mod\u00E8le de contr\u00F4le d'acc\u00E8s discr\u00E9tionnaire, \u00E0 base de matrice d'acc\u00E8s, formalis\u00E9 en 1976."@fr . . . . . . . "The HRU security model (Harrison, Ruzzo, Ullman model) is an operating system level computer security model which deals with the integrity of access rights in the system. It is an extension of the Graham-Denning model, based around the idea of a finite set of procedures being available to edit the access rights of a subject on an object . It is named after its three authors, Michael A. Harrison, Walter L. Ruzzo and Jeffrey D. Ullman. Along with presenting the model, Harrison, Ruzzo and Ullman also discussed the possibilities and limitations of proving the safety of systems using an algorithm."@en . . . . . "\u041C\u043E\u0434\u0435\u043B\u044C \u0425\u0430\u0440\u0440\u0438\u0441\u043E\u043D\u0430-\u0420\u0443\u0437\u0437\u043E-\u0423\u043B\u044C\u043C\u0430\u043D\u0430 (HRU-\u043C\u043E\u0434\u0435\u043B\u044C) \u2014 \u043E\u0434\u043D\u0430 \u0438\u0437 \u0443\u043F\u0440\u0430\u0432\u043B\u0435\u043D\u0438\u044F \u0434\u043E\u0441\u0442\u0443\u043F\u043E\u043C \u0441\u0443\u0431\u044A\u0435\u043A\u0442\u043E\u0432 (\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u0435\u0439) \u043A \u043E\u0431\u044A\u0435\u043A\u0442\u0430\u043C, \u0440\u0435\u0430\u043B\u0438\u0437\u043E\u0432\u0430\u043D\u043D\u0430\u044F \u0441 \u043F\u043E\u043C\u043E\u0449\u044C\u044E . \u041D\u0430\u0437\u0432\u0430\u043D\u0430 \u0432 \u0447\u0435\u0441\u0442\u044C \u0442\u0440\u0451\u0445 \u0435\u0433\u043E \u0430\u0432\u0442\u043E\u0440\u043E\u0432: , \u0438 \u0414\u0436\u0435\u0444\u0444\u0440\u0438 \u0423\u043B\u044C\u043C\u0430\u043D\u0430."@ru . . . . . . . . "\u041C\u043E\u0434\u0435\u043B\u044C \u0425\u0430\u0440\u0440\u0438\u0441\u043E\u043D\u0430-\u0420\u0443\u0437\u0437\u043E-\u0423\u043B\u044C\u043C\u0430\u043D\u0430 (HRU-\u043C\u043E\u0434\u0435\u043B\u044C) \u2014 \u043E\u0434\u043D\u0430 \u0438\u0437 \u0443\u043F\u0440\u0430\u0432\u043B\u0435\u043D\u0438\u044F \u0434\u043E\u0441\u0442\u0443\u043F\u043E\u043C \u0441\u0443\u0431\u044A\u0435\u043A\u0442\u043E\u0432 (\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u0435\u0439) \u043A \u043E\u0431\u044A\u0435\u043A\u0442\u0430\u043C, \u0440\u0435\u0430\u043B\u0438\u0437\u043E\u0432\u0430\u043D\u043D\u0430\u044F \u0441 \u043F\u043E\u043C\u043E\u0449\u044C\u044E . \u041D\u0430\u0437\u0432\u0430\u043D\u0430 \u0432 \u0447\u0435\u0441\u0442\u044C \u0442\u0440\u0451\u0445 \u0435\u0433\u043E \u0430\u0432\u0442\u043E\u0440\u043E\u0432: , \u0438 \u0414\u0436\u0435\u0444\u0444\u0440\u0438 \u0423\u043B\u044C\u043C\u0430\u043D\u0430."@ru . . . . . "\u041C\u043E\u0434\u0435\u043B\u044C \u0425\u0430\u0440\u0440\u0438\u0441\u043E\u043D\u0430-\u0420\u0443\u0437\u0437\u043E-\u0423\u043B\u044C\u043C\u0430\u043D\u0430"@ru . . "929976454"^^ . . "Mod\u00E8le HRU"@fr . . . .