Computational paradigms and protection

  • Authors:
  • Simon N. Foley;John P. Morrison

  • Affiliations:
  • University College, Cork, Ireland;University College, Cork, Ireland

  • Venue:
  • Proceedings of the 2001 workshop on New security paradigms
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

We investigate how protection requirements may be specified and implemented using the imperative, availability and coercion paradigms. Conventional protection mechanisms generally follow the imperative paradigm, requiring explicit and often centralized control over the sequencing and the mediation of security critical operations. This paper illustrates how casting protection in the availability and/or coercion styles provides the basis for more flexible and potentially distributed control over the sequencing and mediation of these operations.