2014
DOI: 10.1093/comjnl/bxu125
|View full text |Cite
|
Sign up to set email alerts
|

Password Management: Distribution, Review and Revocation

Abstract: We consider the problem of access privilege management in a classical protection environment featuring subjects attempting to access the protected objects. We express an access privilege in terms of an access right and a privilege level. The privilege level and a protection diagram associated with each given object determine whether a nominal access privilege for this object corresponds to an effective, possibly weaker access privilege, or is revoked. We associate a password system with each object; the passwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
1

Relationship

6
1

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…In a classical protection system paradigm, a set of active entities, the subjects, generates access attempts to a set of passive entities, the protected objects [10], [11], [12]. When a subject issues an access to a given object, the access terminates successfully only if that subject holds the corresponding access privileges.…”
Section: The Protection Modelmentioning
confidence: 99%
“…In a classical protection system paradigm, a set of active entities, the subjects, generates access attempts to a set of passive entities, the protected objects [10], [11], [12]. When a subject issues an access to a given object, the access terminates successfully only if that subject holds the corresponding access privileges.…”
Section: The Protection Modelmentioning
confidence: 99%
“…A related problem is that of access right revocation. Several solutions have been proposed to this problem [21]. A propagation graph can be constructed for each capability, which keeps track of all copies of this capability [7].…”
Section: Revocationmentioning
confidence: 99%
“…In a classic protection system paradigm, a set of active subjects (users, processes) attempts to access a set of passive, typed entities called objects [21], [38]. The type of a given object states the set of the operations that can be executed on this object, and the access rights that are necessary to accomplish each operation successfully.…”
Section: Introductionmentioning
confidence: 99%
“…the method to restrict the extent of an access privilege by eliminating one or more access rights), and revocation (i.e. the ability to prevent further utilization of a given access privilege) [29]. In the capability list approach, segregation needs to be supported by ad-hoc mechanisms, e.g.…”
Section: Password Capabilitiesmentioning
confidence: 99%