Capability-based security

Results: 256



#Item
231Memory management / Real-time operating systems / Central processing unit / Kernel / Ring / Multics / Operating system / Capability-based security / Microkernel / System software / Computer architecture / Software

Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems Peter G. Neumann and Robert N. M. Watson SRI International Computer Science Laboratory and University of Cambridge Computer La

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2011-02-22 19:36:24
232Real-time operating systems / Memory management / Central processing unit / Virtual machines / Access control / Capability-based security / Kernel / EROS / Ring / Computer architecture / System software / Computing

Unpublished workshop paper for RESoLVE’12 - March 3, [removed]London, UK CHERI: a research platform deconflating

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-03-17 19:25:43
233Unix / Computer security / Access control / Capability-based security / Sandbox / File descriptor / Open / Unix domain socket / FreeBSD / Software / System software / Computing

Capsicum: practical capabilities for UNIX Robert N. M. Watson University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2010-06-02 06:08:28
234ISO / Quality / Quality management / Capability-based security / Online shopping / Requirement / Management / Electronic commerce / Business

Date Area of Capability COMPANY NAME

Add to Reading List

Source URL: www.defence.gov.au

Language: English - Date: 2014-04-22 19:12:38
235L4 microkernel family / Microkernel / Gernot Heiser / Kernel / Monolithic kernels / EROS / Open Kernel Labs / Capability-based security / Architecture of Windows NT / Computer architecture / System software / Software

From L3 to seL4 What Have We Learnt in 20 Years of L4 Microkernels? Kevin Elphinstone and Gernot Heiser

Add to Reading List

Source URL: ssrg.nicta.com.au

Language: English - Date: 2013-10-20 22:09:38
236Coyotos / EROS / Microkernel / Capability-based security / Kernel / L4 microkernel family / KeyKOS / Persistence / Mach / Computer architecture / Computing / Computer security

Towards a Verified, General-Purpose Operating System Kernel† Jonathan Shapiro, Ph.D., Michael Scott Doerrie, Eric Northup, Swaroop

Add to Reading List

Source URL: www.coyotos.org

Language: English - Date: 2014-01-16 10:10:58
237Unix / System administration / Cryptographic software / Privilege separation / OpenSSH / Privilege / Secure Shell / Principle of least privilege / Capability-based security / System software / Software / Computer security

Preventing Privilege Escalation Niels Provos CITI, University of Michigan

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2003-08-09 19:06:37
238Crime prevention / National security / Operating system / Mandatory access control / Password / Kernel / Access Control Matrix / Capability-based security / Ring / Security / Computer security / Access control

Microsoft Word - OS Security Considerations

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2005-07-05 08:26:00
239Development studies / Welfare economics / Martha Nussbaum / Capability approach / Bodily integrity / Need / Emotion / Capability-based security / Amartya Sen / Development / Economics / Development economics

94 Review Section / Society and Animals[removed]

Add to Reading List

Source URL: www.animalsandsociety.org

Language: English - Date: 2011-11-11 17:56:20
240Real-time operating systems / Memory management / Central processing unit / Virtual machines / Access control / Capability-based security / Kernel / EROS / Ring / Computer architecture / System software / Computing

Unpublished workshop paper for RESoLVE’12 - March 3, [removed]London, UK CHERI: a research platform deconflating

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2012-03-06 02:50:53
UPDATE