This paper examines the most relevant calculi to describe and model mobile and distributed computations and focuses on the access control problem. In the security world every request for the access to a resource is honored if and only if the subject requiring the resource is an authorized user of the system and the request agrees with a given policy. Two examples have been chosen to illustrate these topics: the firewall and the communication by means of named channels.

Access control in mobile ambient calculi: A comparative view

MARGARIA, Ines Maria;ZACCHI, Maddalena
2008-01-01

Abstract

This paper examines the most relevant calculi to describe and model mobile and distributed computations and focuses on the access control problem. In the security world every request for the access to a resource is honored if and only if the subject requiring the resource is an authorized user of the system and the request agrees with a given policy. Two examples have been chosen to illustrate these topics: the firewall and the communication by means of named channels.
2008
398 (1-3)
183
202
Mobile ambient calculi, Access control, Security policies, Authentication
I. MARGARIA; M. ZACCHI
File in questo prodotto:
File Dimensione Formato  
Access.pdf

Accesso riservato

Tipo di file: POSTPRINT (VERSIONE FINALE DELL’AUTORE)
Dimensione 880.56 kB
Formato Adobe PDF
880.56 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2318/27460
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 1
social impact