Capability-based security

Results: 256



#Item
51Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-05-06 16:45:01
52     Summary of the capability assessment For the capability assessment the SZREDA team and the local working group use the methods described in the chapter for the capability assessment from the

    Summary of the capability assessment For the capability assessment the SZREDA team and the local working group use the methods described in the chapter for the capability assessment from the

Add to Reading List

Source URL: www.prismaproject.eu

Language: English - Date: 2014-10-20 12:17:31
53Microsoft Word - JEssen-democratic selection

Microsoft Word - JEssen-democratic selection

Add to Reading List

Source URL: www.happysociety.org

Language: English - Date: 2015-04-07 18:52:17
54Access control / Data types / Primitive types / Capability-based security / Object-capability model / EROS / Capability-based addressing / Pointer / Principle of least privilege / Computer security / Security / Computing

unknown2004-10-23T01:01:00 unknown2004-10-23T01:01:00 unknown2004-10-23T00:34:00^ unknown2004-10-23T00:35:00^

Add to Reading List

Source URL: erights.org

Language: English - Date: 2005-10-31 19:06:12
55

PDF Document

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-01 09:34:28
56Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems Peter G. Neumann and Robert N. M. Watson SRI International Computer Science Laboratory and University of Cambridge Computer La

Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems Peter G. Neumann and Robert N. M. Watson SRI International Computer Science Laboratory and University of Cambridge Computer La

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-03-01 06:45:15
57Capability-based security / Object-capability model / Access control list / EROS / Confused deputy problem / Ambient authority / Access Control Matrix / C-list / Infrastructure optimization / Security / Computer security / Access control

Capability Myths Demolished Mark S. Miller Combex, Inc.

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2005-10-31 18:00:51
58Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2007-08-17 11:07:47
59Scalable Security for Petascale Parallel File Systems Andrew W. Leung Ethan L. Miller  Stephanie Jones

Scalable Security for Petascale Parallel File Systems Andrew W. Leung Ethan L. Miller Stephanie Jones

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2014-02-12 18:01:49
60XPOLA – An Extensible Capability-based Authorization Infrastructure for Grids Liang Fang and Dennis Gannon Computer Science Department, Indiana University, Bloomington, INFrank Siebenlist

XPOLA – An Extensible Capability-based Authorization Infrastructure for Grids Liang Fang and Dennis Gannon Computer Science Department, Indiana University, Bloomington, INFrank Siebenlist

Add to Reading List

Source URL: www.extreme.indiana.edu

Language: English - Date: 2005-06-09 17:29:36