Memory protection in embedded systems

L Lopriore - Journal of Systems Architecture, 2016 - Elsevier
With reference to an embedded system featuring no support for memory management, we
present a model of a protection system based on passwords. At the hardware level, our …

Password management: distribution, review and revocation

L Lopriore - The Computer Journal, 2015 - academic.oup.com
We consider the problem of access privilege management in a classical protection
environment featuring subjects attempting to access the protected objects. We express an …

A paradigm for secure object access and unrestricted mobility in distributed systems

L Lopriore - International Journal of Parallel, Emergent and …, 2022 - Taylor & Francis
In distributed architectures consisting of processing nodes, we associate a node chain with
each object. The node chain connects a node named in the object identifier to the nodes …

Distributed storage protection in wireless sensor networks

G Dini, L Lopriore - Journal of Systems Architecture, 2015 - Elsevier
With reference to a distributed architecture consisting of sensor nodes connected in a
wireless network, we present a model of a protection system based on segments and …

Password systems: design and implementation

G Dini, L Lopriore - Computers & Electrical Engineering, 2015 - Elsevier
Critical infrastructures require protection systems that are both flexible and efficient.
Flexibility is essential to capture the multi-organizational and state-based nature of these …

Password Systems: Problems and Solutions

L Lopriore - … Journal of Advanced Computer Science and …, 2022 - search.proquest.com
In a security environment featuring subjects and objects, we consider an alternative to the
classical password paradigm. In this alternative, a key includes a password, an object …

Access control lists in password capability environments

L Lopriore - Computers & Security, 2016 - Elsevier
With reference to a protection system featuring active subjects that attempt to access
passive, typed objects, we propose a set of mechanisms supporting the distribution …

Access right management by extended password capabilities

L Lopriore - International Journal of Information Security, 2018 - Springer
With reference to a classic protection system featuring active subjects that reference
protected objects, we approach the problem of identifying the objects that each subject can …

[HTML][HTML] Protected pointers to specify access privileges in distributed systems

L Lopriore, A Santone - Journal of Parallel and Distributed Computing, 2019 - Elsevier
With reference to a distributed environment consisting of nodes connected in an arbitrary
network topology, we propose the organization of a protection system in which a set of …

Information and data security model: Background, risks, and challenges

B Taneja, B Bhushan - Emerging Technologies in Data Mining and …, 2021 - Springer
Abstract Information security and data security are the processes that are mainly based on
preventing information from unauthorized access or in other words to secure information and …