Capability-based security

Results: 256



#Item
1Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

Add to Reading List

Source URL: dominictarr.github.io

Language: English - Date: 2015-07-10 14:55:46
2Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

Add to Reading List

Source URL: dominictarr.github.io

Language: English - Date: 2015-07-10 14:55:46
3Software / System software / Computer architecture / Disk file systems / Network file systems / File system / ZFS / Tar / XFS / Capability-based security / Filesystem in Userspace / Data

Hierarchical File Systems are Dead Margo Seltzer, Nicholas Murphy Harvard School of Engineering and Applied Sciences Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2009-04-29 19:50:23
4Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 1997-12-31 17:54:34
5Business / Professional studies / Economy / Groupware / Multimodal interaction / Information economics / Social information processing / Business software / Collaborative software / Knowledge worker / Capability-based security / Object Process Methodology

Toward HighPerformance Organizations Role For Groupware Strategic

Add to Reading List

Source URL: www.dougengelbart.org

Language: English - Date: 2008-02-19 12:40:08
6Aula / Pavia / Capability-based security / Capability / Science / Academia

WP2WorkshopWORKABLEMAY2010FINAL_Alkje

Add to Reading List

Source URL: workable-eu.org

Language: English - Date: 2013-03-03 07:04:12
7Software / System software / Computer architecture / Access control / POSIX / Unix / System calls / Sandbox / Capability-based security / File descriptor / Mandatory access control / Unix domain socket

fig-capsicum-processes.graffle

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-03-09 05:43:31
8Economics / Economy / Academia / Capability approach / Amartya Sen / Martha Nussbaum / Human development / Capability-based security / Education / Reproductive health / Well-being / Capability management in business

Microsoft Word - WEBSITE Capabilty Approach.doc

Add to Reading List

Source URL: www.nottingham.ac.uk

Language: English - Date: 2010-11-14 03:16:18
9Cloud clients / Portable software / Sandbox / FreeBSD / Unix / Inetd / Chromium / Ioctl / Capability-based security / Google Chrome / Capsicum / Operating system

Capsicum working group Robert N.M. Watson University of Cambridge FreeBSD Developer Summit

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-07-21 06:37:47
10Inter-process communication / Distributed computing architecture / Network protocols / World Wide Web / Server / Server hardware / Stub / File system / Amoeba / Capability-based security / Clientserver model / Local Procedure Call

PDF Document

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-02-09 21:01:22
UPDATE