Password capabilities revisited
L Lopriore - The Computer Journal, 2015 - ieeexplore.ieee.org
With reference to a distributed system consisting of nodes connected by a local area
network, we present a new formulation of the password capability paradigm that takes …
network, we present a new formulation of the password capability paradigm that takes …
Password management: distribution, review and revocation
L Lopriore - The Computer Journal, 2015 - academic.oup.com
We consider the problem of access privilege management in a classical protection
environment featuring subjects attempting to access the protected objects. We express an …
environment featuring subjects attempting to access the protected objects. We express an …
A code self-relocation method for embedded system
T Xinyu, Z Changyou, L Chen, K Aourra… - … (CSE) and IEEE …, 2017 - ieeexplore.ieee.org
Symbol relocation is very important for program linking and execution. For modern operating
systems in PC, symbol relocation process is completed by static linking or dynamic linking …
systems in PC, symbol relocation process is completed by static linking or dynamic linking …
Distributed storage protection in wireless sensor networks
G Dini, L Lopriore - Journal of Systems Architecture, 2015 - Elsevier
With reference to a distributed architecture consisting of sensor nodes connected in a
wireless network, we present a model of a protection system based on segments and …
wireless network, we present a model of a protection system based on segments and …
Password systems: design and implementation
G Dini, L Lopriore - Computers & Electrical Engineering, 2015 - Elsevier
Critical infrastructures require protection systems that are both flexible and efficient.
Flexibility is essential to capture the multi-organizational and state-based nature of these …
Flexibility is essential to capture the multi-organizational and state-based nature of these …
Access control lists in password capability environments
L Lopriore - Computers & Security, 2016 - Elsevier
With reference to a protection system featuring active subjects that attempt to access
passive, typed objects, we propose a set of mechanisms supporting the distribution …
passive, typed objects, we propose a set of mechanisms supporting the distribution …
Protection structures in multithreaded systems
L Lopriore - The Computer Journal, 2013 - academic.oup.com
We consider a single-address-space system which implements a form of segmentation with
paging within the framework of the multithreaded model of program execution. A salient …
paging within the framework of the multithreaded model of program execution. A salient …
Access right management by extended password capabilities
L Lopriore - International Journal of Information Security, 2018 - Springer
With reference to a classic protection system featuring active subjects that reference
protected objects, we approach the problem of identifying the objects that each subject can …
protected objects, we approach the problem of identifying the objects that each subject can …
[HTML][HTML] Protected pointers to specify access privileges in distributed systems
L Lopriore, A Santone - Journal of Parallel and Distributed Computing, 2019 - Elsevier
With reference to a distributed environment consisting of nodes connected in an arbitrary
network topology, we propose the organization of a protection system in which a set of …
network topology, we propose the organization of a protection system in which a set of …
Object protection in distributed systems
L Lopriore - Journal of Parallel and Distributed Computing, 2013 - Elsevier
With reference to a distributed system consisting of nodes connected by a local area
network, we consider a salient aspect of the protection problem, the representation of access …
network, we consider a salient aspect of the protection problem, the representation of access …