<--- Back to Details
First PageDocument Content
Computer network security / Access control / Capability-based security / Computer security / Kernel / Object-capability model / Operating system / Programming language / Linux kernel / Computing / Computer architecture / Security
Date: 2004-12-03 12:46:43
Computer network security
Access control
Capability-based security
Computer security
Kernel
Object-capability model
Operating system
Programming language
Linux kernel
Computing
Computer architecture
Security

Add to Reading List

Source URL: www.info.ucl.ac.be

Download Document from Source Website

File Size: 681,79 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

DocID: 1xUQb - View Document

Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

DocID: 1xT6c - View Document

Software / System software / Computer architecture / Disk file systems / Network file systems / File system / ZFS / Tar / XFS / Capability-based security / Filesystem in Userspace / Data

Hierarchical File Systems are Dead Margo Seltzer, Nicholas Murphy Harvard School of Engineering and Applied Sciences Abstract

DocID: 1rbB7 - View Document

Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

DocID: 1r6Eg - View Document

Business / Professional studies / Economy / Groupware / Multimodal interaction / Information economics / Social information processing / Business software / Collaborative software / Knowledge worker / Capability-based security / Object Process Methodology

Toward HighPerformance Organizations Role For Groupware Strategic

DocID: 1qIIY - View Document