2016
DOI: 10.1016/j.cose.2016.08.005
|View full text |Cite
|
Sign up to set email alerts
|

Access control lists in password capability environments

Abstract: With reference to a protection system featuring active subjects that attempt to access passive, typed objects,we propose a set of mechanisms supporting the distribution,verification,review and revocation of access privileges. In our approach, a protection domain is a collection of access rights for the protected objects. An access control list is associated with each object to specify the access rights in each domain. Objects are grouped into clusters.To access the objects in a given cluster, a subject present… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…The access matrix, introduced in Section 2, can be represented in memory by columns. In this case, a list, called the access control list, is associated with each object [29]. The access control list ACL j of object B j consists of a collection of entries having the form (S i , z), where S i is the name of a subject, and z is an access authorization.…”
Section: Access Control Listsmentioning
confidence: 99%
“…The access matrix, introduced in Section 2, can be represented in memory by columns. In this case, a list, called the access control list, is associated with each object [29]. The access control list ACL j of object B j consists of a collection of entries having the form (S i , z), where S i is the name of a subject, and z is an access authorization.…”
Section: Access Control Listsmentioning
confidence: 99%
“…In a well-known approach, the state of a protection system is expressed by associating an access control list with each object [19], [24], [26]. The access control list ACL G associated with object G consists of a set of entries having the form (D, AR), where D denotes a protection domain, and AR specifies the access rights for G, which are contained in D.…”
Section: Access Control Listsmentioning
confidence: 99%