In a protected system, we deal with a multiple authorization when a subject is allowed to access a protected object only if several other subjects agree. In this paper, such a problem is examined, and a solution is given with reference to an extended capability environment. The solution presented holds [or every number of agreeing subjects. Application problems are briefly illustrated.

Implementing multiple authorizations by extended capabilities

1981

Abstract

In a protected system, we deal with a multiple authorization when a subject is allowed to access a protected object only if several other subjects agree. In this paper, such a problem is examined, and a solution is given with reference to an extended capability environment. The solution presented holds [or every number of agreeing subjects. Application problems are briefly illustrated.
1981
Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo" - ISTI
Inglese
Congresso annuale AICA
559
563
6
Sì, ma tipo non specificato
23-25/09/1981
Pavia, Italy
Implementing multiple authorizations
Extended capabilities
Codice puma: /cnr.iei/1981-B2-012 (codice originale: IEI-L81-12)
0
open
Corsini P.; Frosini G.; Lopriore L.
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
File Dimensione Formato  
prod_421484-doc_149640.pdf

accesso aperto

Descrizione: Implementing multiple authorizations by extended capabilities
Tipologia: Versione Editoriale (PDF)
Dimensione 1.51 MB
Formato Adobe PDF
1.51 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/403773
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact