In a protected system, we deal with a multiple authorization when a subject is allowed to access a protected object only if several other subjects agree. In this paper, such a problem is examined, and a solution is given with reference to an extended capability environment. The solution presented holds [or every number of agreeing subjects. Application problems are briefly illustrated.

Implementing multiple authorizations by extended capabilities

1981

Abstract

In a protected system, we deal with a multiple authorization when a subject is allowed to access a protected object only if several other subjects agree. In this paper, such a problem is examined, and a solution is given with reference to an extended capability environment. The solution presented holds [or every number of agreeing subjects. Application problems are briefly illustrated.
1981
Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo" - ISTI
Implementing multiple authorizations
Extended capabilities
File in questo prodotto:
File Dimensione Formato  
prod_421484-doc_149640.pdf

accesso aperto

Descrizione: Implementing multiple authorizations by extended capabilities
Tipologia: Versione Editoriale (PDF)
Dimensione 1.51 MB
Formato Adobe PDF
1.51 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/403773
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact