Capability-based security

Results: 256



#Item
31Computer network security / Internet Protocol / IPv6 / Trusted computing base / Computer network / Virtual private network / Kernel / Capability-based security / Ring / Computer security / Security / Computing

An Overview of the Annex System D.A. Grove T.C. Murray C.A. Owen C.J. North J.A. Jones M.R. Beaumont

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2007-12-17 22:49:19
32Public-key cryptography / Computer network security / Capability-based security / Tahoe Least-Authority Filesystem / Key management / Internet privacy / Computer security / Authentication / Cloud computing / Cryptography / Security / Access control

Tamias: a privacy aware distributed storage Jean Lorchat, Cristel Pelsser, Randy Bush, Keiichi Shima Internet Initiative Japan, Inc. {jean,cristel,randy,keiichi}@iijlab.net 1

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2011-02-12 20:29:24
33Operating system / Ring / Kernel / Capability-based security / Multilevel security / Virtual machine / System software / Security / Computer security

Hardware Requirements for Secure Computer Systems: A Framework† Carl E. Landwehr Computer Science and Systems Branch Naval Research Laboratory Washington, D.C.

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:51
34Capability-based security / Intel iAPX 432 / Discretionary access control / Kernel / Authorization / Capability-based addressing / Mandatory access control / Security / Computer security / Access control

On Access Checking in Capability-Based Systems1 Richard Y. Kain Carl E. Landwehr University of Minnesota

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:23
35Elevator / Capability-based security

UIDA Consulting Group, Inc. United Indian Development Association

Add to Reading List

Source URL: navajobusiness.com

Language: English - Date: 2012-05-01 12:15:10
36Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
37Identity management / Kernel / Operating system / Ring / Capability-based security / Microsoft Access / Authorization / Mandatory access control / Security and safety features new to Windows Vista / Security / Computer security / Access control

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2002-10-18 14:01:21
38Design / Accessibility / Developmental dyslexia / Visual thinking / Universal design / Capability-based security / X Window System / Visual arts / Software / Architecture

http://www.inclusivedesigntoolkit.com/TEST_site/usercapabilitie

Add to Reading List

Source URL: www.inclusivedesigntoolkit.com

Language: English - Date: 2015-03-19 08:21:57
39Multics / Operating system / Unix / Ring / B / Kernel / Linux kernel / System Development Corporation / Capability-based security / Computer architecture / System software / Software

NRL ReportBest Available Technologies (BATs) for Computer Security CARL

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:16
40Capability-based security / Engineering / Survivability / Frigate

RINA Conference, WARSHIP – 13 June, Bath, UK HOW TO SQUARE THE CIRCLE FOR THE NEXT GENERATION OF PATROL SHIP DESIGNS A Kimber, BEng, CEng, MRINA, BMT Defence Services Ltd, UK. B Thorne, BEng Hons C Eng, MIMech

Add to Reading List

Source URL: www.bmtdsl.co.uk

Language: English - Date: 2013-07-11 04:46:46
UPDATE