This paper examines the most relevant calculi to describe and model mobile and distributed computations and focuses on the access control problem. In the security world every request for the access to a resource is honored if and only if the subject requiring the resource is an authorized user of the system and the request agrees with a given policy. Two examples have been chosen to illustrate these topics: the firewall and the communication by means of named channels.
Access control in mobile ambient calculi: A comparative view
MARGARIA, Ines Maria;ZACCHI, Maddalena
2008-01-01
Abstract
This paper examines the most relevant calculi to describe and model mobile and distributed computations and focuses on the access control problem. In the security world every request for the access to a resource is honored if and only if the subject requiring the resource is an authorized user of the system and the request agrees with a given policy. Two examples have been chosen to illustrate these topics: the firewall and the communication by means of named channels.File in questo prodotto:
File | Dimensione | Formato | |
---|---|---|---|
Access.pdf
Accesso riservato
Tipo di file:
POSTPRINT (VERSIONE FINALE DELL’AUTORE)
Dimensione
880.56 kB
Formato
Adobe PDF
|
880.56 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.