Capability-based security

Results: 256



#Item
101Programming paradigms / CapDesk / Principle of least privilege / Object-capability model / Trusted computing base / Kernel / Separation of concerns / Capability-based security / Abstraction / Security / Computer security / Access control

The Structure of Authority: Why Security Is not a Separable Concern Mark S. Miller1,2 , Bill Tulloh3, , and Jonathan S. Shapiro2 1 2 3

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:19
102Cross-platform software / EROS / Java / Application programming interface / Coyotos / Capability-based security / Form / Computing / Computer architecture / Software

Re-Inventing the NullStream Jonathan Shapiro, Ph.D. The EROS Group, LLC December 6, 2007 Abstract Building your first Coyotos application may seem a bit daunting. This tutorial describes how to build a first,

Add to Reading List

Source URL: www.coyotos.org

Language: English - Date: 2014-08-13 02:11:46
103Education / NICTA / Griffith University / University of Melbourne / CeBIT / Australian National University / University of New South Wales / Information and communication technologies in education / Capability-based security / Association of Commonwealth Universities / Academia / Higher education

ISSUE 30 | JUNE[removed]INSIDE Australia wins Euro Patent Office award

Add to Reading List

Source URL: www.nicta.com.au

Language: English - Date: 2015-02-08 20:31:44
104Capability-based security / Association of Pacific Rim Universities / Australian National University / Project management

MT Stromlo RSAA Accommodation Project

Add to Reading List

Source URL: facilities.anu.edu.au

Language: English - Date: 2013-12-17 17:16:15
105Development studies / Welfare economics / Capability approach / Martha Nussbaum / Brotherhood of St Laurence / Development as Freedom / Amartya Sen / Capability-based security / Need / Development / Development economics / Economics

Valuing capabilities in later life: the capability approach and the Brotherhood of St Laurence aged services – summary

Add to Reading List

Source URL: www.bsl.org.au

Language: English
106Software testing / Hacking / Cross-platform software / Vulnerability / Debian / Capability-based security / Requirement / Common Vulnerabilities and Exposures / Computer security / Software / Cyberwarfare

Requirements and Recommendations for CVE Compatibility This is a draft report and does not represent an official position of The MITRE Corporation. © 2013, The MITRE Corporation. All rights reserved. Permission is grant

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2013-07-10 15:37:57
107Business / Business software / Travel agency / Online shopping / Computer reservations system / Capability-based security / Technology / Electronic commerce / Airline tickets / Travel technology

www.respax.com.au CHOOSING A TOUR RESERVATION SYSTEM – QUESTIONS TO ASK THE SYSTEM SUPPLIER Software Trials and Demonstrations You need to know the product will work for your business. The only way you can really know

Add to Reading List

Source URL: www.respax.com.au

Language: English - Date: 2010-10-05 22:46:01
108Open Kernel Labs / L4 microkernel family / Gi-Fi / LIXI / Framework Programmes for Research and Technological Development / Capability-based security / Ambient intelligence / Electronics / NICTA / Computing / Technology

imagination[removed]Annual Research Report from imagination to impact Focusing on imagination

Add to Reading List

Source URL: www.nicta.com.au

Language: English - Date: 2015-02-06 06:40:49
109Higher education / L4 microkernel family / Gi-Fi / LIXI / Education / Defence Science and Technology Organisation / Australian National University / Capability-based security / University of New South Wales / Association of Commonwealth Universities / NICTA / Academia

Mid-year (Q2) Report to the Australian Government[removed]January – 30 June 2008 Contents Mid-year (Q2) Report to the Australian Government 2008

Add to Reading List

Source URL: www.nicta.com.au

Language: English - Date: 2015-02-06 06:47:08
110Access control / Capability-based security / Microkernel / L4 microkernel family / Coyotos / EROS / Formal verification / Kernel / Isabelle / Computer architecture / Security / Computer security

capDL: A Language for Describing Capability-Based Systems Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker NICTA and University of New South Wales Sydney, Australia

Add to Reading List

Source URL: ssrg.nicta.com.au

Language: English - Date: 2013-10-20 22:10:09
UPDATE