In a protected system, we deal with a multiple authorization when a subject is allowed to access a protected object only if several other subjects agree. In this paper, such a problem is examined, and a solution is given with reference to an extended capability environment. The solution presented holds [or every number of agreeing subjects. Application problems are briefly illustrated.
Implementing multiple authorizations by extended capabilities
1981
Abstract
In a protected system, we deal with a multiple authorization when a subject is allowed to access a protected object only if several other subjects agree. In this paper, such a problem is examined, and a solution is given with reference to an extended capability environment. The solution presented holds [or every number of agreeing subjects. Application problems are briefly illustrated.File in questo prodotto:
| File | Dimensione | Formato | |
|---|---|---|---|
|
prod_421484-doc_149640.pdf
accesso aperto
Descrizione: Implementing multiple authorizations by extended capabilities
Tipologia:
Versione Editoriale (PDF)
Dimensione
1.51 MB
Formato
Adobe PDF
|
1.51 MB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


