{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T00:40:07Z","timestamp":1736642407392,"version":"3.32.0"},"reference-count":19,"publisher":"Wiley","issue":"10","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":8064,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[1984,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this paper a capability addressing environment is presented, based on the concept of extended capability. First of all it is shown that such an environment is well suited for implementing objects of abstract type. Then the problem of distributing and revoking access authorizations on abstract objects is considered and an efficient solution is presented. The revocation mechanism results in being selective, transitive and deferred.<\/jats:p>","DOI":"10.1002\/spe.4380141004","type":"journal-article","created":{"date-parts":[[2006,11,18]],"date-time":"2006-11-18T03:50:04Z","timestamp":1163821804000},"page":"931-943","source":"Crossref","is-referenced-by-count":3,"title":["Distributing and revoking access authorizations on abstract objecs: A capability approch"],"prefix":"10.1002","volume":"14","author":[{"given":"P.","family":"Corsini","sequence":"first","affiliation":[]},{"given":"G.","family":"Frosini","sequence":"additional","affiliation":[]},{"given":"L.","family":"Lopriore","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380110306"},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.230193"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/356678.356682"},{"key":"e_1_2_1_5_2","unstructured":"G. S.GrahamandP. J.Denning \u2018Protection\u2014principles and practice\u2019 Proc. AFIPS 1972 SJCC pp.417\u2013429."},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361070"},{"key":"e_1_2_1_7_2","first-page":"437","article-title":"Protection\u2019, Proc. 5th Princeton Symp. on Information Sciences and Systems, Princeton University, March 1971","volume":"8","author":"Lampton B. W.","year":"1974","journal-title":"Operating Systems Review"},{"key":"e_1_2_1_8_2","doi-asserted-by":"crossref","unstructured":"B. W.Lampson \u2018Dynamic protection structures\u2019 Proc. AFIPS 1969 FJCC pp.27\u201338.","DOI":"10.1145\/1478559.1478563"},{"key":"e_1_2_1_9_2","first-page":"83","article-title":"Protection structures in computer systems","volume":"12","author":"Corsini P.","year":"1982","journal-title":"Rivista di Informatica"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312816"},{"key":"e_1_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/359605.359618"},{"key":"e_1_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/800233.807045"},{"key":"e_1_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/359763.359771"},{"key":"e_1_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/954666.971189"},{"key":"e_1_2_1_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380070102"},{"key":"e_1_2_1_16_2","unstructured":"C.Shaffer A.SnyderandR.Atkinson The CLU Reference Manual Rev. 1 MIT\u2010Project MAC September1975."},{"key":"e_1_2_1_17_2","unstructured":"Reference Manual for the Ada Programming Language U.S. Department of Defense July1980."},{"key":"e_1_2_1_18_2","unstructured":"P.Corsini G.Frosini F.GrandoniandL.Lopriore \u2018Capability based addressing: an overview\u2019 Proc. AICA Annual Conference 80 AICA October1980 pp.164\u2013176."},{"key":"e_1_2_1_19_2","unstructured":"P.Corsini G.FrosiniandL.Lopriore \u2018Implementing multiple authorizations by extended capabilities\u2019 Proc. AICA Annual Conference '81 AICA September1981 pp.559\u2013563."},{"key":"e_1_2_1_20_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/27.2.127"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.4380141004","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.4380141004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T00:04:28Z","timestamp":1736640268000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.4380141004"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1984,10]]},"references-count":19,"journal-issue":{"issue":"10","published-print":{"date-parts":[[1984,10]]}},"alternative-id":["10.1002\/spe.4380141004"],"URL":"https:\/\/doi.org\/10.1002\/spe.4380141004","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"type":"print","value":"0038-0644"},{"type":"electronic","value":"1097-024X"}],"subject":[],"published":{"date-parts":[[1984,10]]}}}