Object-capability model

Results: 26



#Item
11The Risk of Words Writing and Documenting Requirements Course Background: Writing good requirements is more difficult than it appears. The impact of a poorly chosen word can have severe consequences on a project. What st

The Risk of Words Writing and Documenting Requirements Course Background: Writing good requirements is more difficult than it appears. The impact of a poorly chosen word can have severe consequences on a project. What st

Add to Reading List

Source URL: www.mithun.nl

Language: English - Date: 2011-08-29 09:44:56
12Paradigm Lost: Abstraction Mechanisms for Access Control

Paradigm Lost: Abstraction Mechanisms for Access Control

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2003-11-20 19:21:31
13I’d like to use this presentation to tell you about an approach to architecting secure systems that you might not be familiar with. It goes by the name “object capabilities”, and the goal is to help us do a better

I’d like to use this presentation to tell you about an approach to architecting secure systems that you might not be familiar with. It goes by the name “object capabilities”, and the goal is to help us do a better

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
14Paradigm Regained: Abstraction Mechanisms for Access Control Mark S. Miller Hewlett Packard Laboratories, Johns Hopkins University [removed]

Paradigm Regained: Abstraction Mechanisms for Access Control Mark S. Miller Hewlett Packard Laboratories, Johns Hopkins University [removed]

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
15The EROS System Structure† Working Draft, Currently In Progress Jonathan S. Shapiro, Ph.D. Systems Research Laboratory Dept. of Computer Science

The EROS System Structure† Working Draft, Currently In Progress Jonathan S. Shapiro, Ph.D. Systems Research Laboratory Dept. of Computer Science

Add to Reading List

Source URL: www.coyotos.org

Language: English - Date: 2014-08-13 02:11:22
16Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by  Mark Samuel Miller

Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by Mark Samuel Miller

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2006-09-01 02:03:44
17The Structure of Authority: Why Security Is not a Separable Concern Mark S. Miller1,2 , Bill Tulloh3, , and Jonathan S. Shapiro2 1 2 3

The Structure of Authority: Why Security Is not a Separable Concern Mark S. Miller1,2 , Bill Tulloh3, , and Jonathan S. Shapiro2 1 2 3

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:19
18Fine-Grained Privilege Separation for Web Applications Akshay Krishnamurthy Adrian Mettler  David Wagner

Fine-Grained Privilege Separation for Web Applications Akshay Krishnamurthy Adrian Mettler David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
19Joe-E: A Security-Oriented Subset of Java Adrian Mettler David Wagner University of California, Berkeley {amettler, daw}@cs.berkeley.edu

Joe-E: A Security-Oriented Subset of Java Adrian Mettler David Wagner University of California, Berkeley {amettler, daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2010-03-22 11:26:31
20Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by  Mark Samuel Miller

Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by Mark Samuel Miller

Add to Reading List

Source URL: erights.org

Language: English - Date: 2006-09-01 02:03:44