Capability-based security

Results: 256



#Item
221Central processing unit / Capability-based security / Kernel / Ring / L4 microkernel family / Memory-mapped I/O / X86-64 / Computer architecture / Barrelfish / Microsoft Research

Barrelfish Project ETH Zurich Barrelfish Glossary Barrelfish Technical Note 001

Add to Reading List

Source URL: www.barrelfish.org

Language: English - Date: 2013-12-13 09:57:01
222Capability-based security / World Organisation for Animal Health / Security / Mozambique / Political geography / International relations / Access control

Dr. Patrick Bastiaensen OIE Sub-Regional Representation Southern Africa Performance of Veterinary Services Outcomes of PVS missions conducted in SADC Member States from 2007 – 2010.

Add to Reading List

Source URL: www.rr-africa.oie.int

Language: English - Date: 2011-02-15 10:13:46
223Receiver / Management / Access control / Capability-based security / ANT

Adaptive Capability Profiling Colin Machin Matthew Bell Framework Roger Stone

Add to Reading List

Source URL: gradients.lboro.ac.uk

Language: English - Date: 2012-02-13 04:47:37
224Year of birth missing / Association for Computing Machinery / Turing Award / Capability-based security / XPL / Kernel / Symposium on Operating Systems Principles / Computer architecture / Actor model / Computing / Computer science / Procedural programming languages

Curriculum Vitae Butler W. Lampson Employment

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2007-01-20 17:41:25
225Computer security / Access control / Capability-based security / Object-oriented programming / Primitive types / Access token / Object / Reference / Type–token distinction / Computing / Data types / Software engineering

The STAROS System 7.1 Overview of STAROS

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2002-01-14 12:19:17
226Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
227Skill / Capability-based security / Project management / ESCM-SP / Capability management in business / Information technology management / Management / Business

Microsoft Word - SDF March 2014 RGC 10.docx

Add to Reading List

Source URL: www.silc.org.uk

Language: English - Date: 2014-05-12 06:33:13
228Access Control Matrix / Capability-based security / Computer security / Security / Access control

Secure Computer Systems: A Mathematical Model November, 1996 An electronic reconstruction by Len LaPadula

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2004-12-12 14:42:28
229Real-time operating systems / Memory management / Central processing unit / Virtual machines / Access control / Capability-based security / Kernel / EROS / Ring / Computer architecture / System software / Computing

Unpublished workshop paper for RESoLVE’12 - March 3, [removed]London, UK CHERI: a research platform deconflating

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2012-02-11 17:01:45
230New York State Energy Research and Development Authority / Energy storage / Reliability engineering / Systems engineering / Database / Rechargeable battery / Capability-based security / Systems science / Security / Energy law / Economy of New York / Energy policy in the United States

In August 2009, the New York Battery and Energy Storage Technology (NY-BEST) Consortium asked the New York Academy of Sciences to analyze results from a survey of stakeholders in the State’s energy storage research com

Add to Reading List

Source URL: ny-best.org

Language: English - Date: 2012-10-30 10:42:31
UPDATE