Abstract
A salient aspect of protection system design is the set of the mechanisms for the representation, distribution, verification and revocation of access privileges. With reference to a segmented virtual memory space, we present an approach that is based on the use of symmetric-key cryptography to represent segment pointers, including access right specifications. Our design effort has been guided by three main objectives: (i) to maintain the simplicity of access privilege representation that characterizes classical capability and password-capability systems; (ii) to keep the memory requirements low even in the case of complex access privileges expressed in terms of several access rights; and (iii) to allow an easy implementation of effective techniques for access privilege review and revocation.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.