The problem of how the users of a capability-based protection system can define their own protection subsystems is dealt with by referring to a specific generalized capability environment. This environment is first briefly described. Then the definition of a protection subsystem is given, and its abstract behaviour is described in detail: a set of active entities, caned accessors of the subsystem, are capable of performing access attempts to a set of passive entities, caLLed. obJects. The subsystem associates specific access rights to each accessor, allowing that accessor to operate on the protected objects in a restricted fashion. The subsystem also performs the required access right checking, and aborts any unauthorized attempt at obJect utilization. A possibLe way of implementing a protection subsystem ,is presented, which mainly consists of two components, namely an Object Manager and a Protection Monitor. The Object Manager implements the objects to be protected. The FPoteation Monitor, on the other hand, is responsible for the management and checking of access rights. The main problem of allowing the Protection Monitor to identify accessors in a secure fashion is solved by utilizing the properties of the extended capability environment mentioned above.

Un sistema di integrazione di reti per la gestione di informazioni territoriali

Montani C;
1982

Abstract

The problem of how the users of a capability-based protection system can define their own protection subsystems is dealt with by referring to a specific generalized capability environment. This environment is first briefly described. Then the definition of a protection subsystem is given, and its abstract behaviour is described in detail: a set of active entities, caned accessors of the subsystem, are capable of performing access attempts to a set of passive entities, caLLed. obJects. The subsystem associates specific access rights to each accessor, allowing that accessor to operate on the protected objects in a restricted fashion. The subsystem also performs the required access right checking, and aborts any unauthorized attempt at obJect utilization. A possibLe way of implementing a protection subsystem ,is presented, which mainly consists of two components, namely an Object Manager and a Protection Monitor. The Object Manager implements the objects to be protected. The FPoteation Monitor, on the other hand, is responsible for the management and checking of access rights. The main problem of allowing the Protection Monitor to identify accessors in a secure fashion is solved by utilizing the properties of the extended capability environment mentioned above.
1982
Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo" - ISTI
Sistema di integrazione
Reti
Informazioni territoriali
File in questo prodotto:
File Dimensione Formato  
prod_421326-doc_149534.pdf

solo utenti autorizzati

Descrizione: Un sistema di integrazione di reti per la gestione di informazioni territoriali
Tipologia: Versione Editoriale (PDF)
Dimensione 811.43 kB
Formato Adobe PDF
811.43 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/410889
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact