Back to Results
First PageMeta Content
Capability-based security / Object-capability model / Access control list / EROS / Confused deputy problem / Ambient authority / Access Control Matrix / C-list / Infrastructure optimization / Security / Computer security / Access control


Capability Myths Demolished Mark S. Miller Combex, Inc.
Add to Reading List

Document Date: 2005-10-31 18:00:51


Open Document

File Size: 1,28 MB

Share Result on Facebook

City

Reading / /

Company

Capability-Based Computer Systems / Distributed Computing Systems / Anderson / Object-Capability Systems / IEEE Software / UMI Press / Myths Demolished Mark S. Miller Combex Inc. / /

/

Facility

University of Cambridge Computer Laboratory / Ka-Ping Yee University of California / /

IndustryTerm

capability systems / secure systems / pure capability systems / confinement systems / software components / security systems / type-enforced capability systems / unbroken chain / software component / access control list systems / real-world security systems / ambient authority systems / object capability systems / real-world systems / password capability systems / /

OperatingSystem

Unix / KeyKOS / POSIX / /

Organization

MIT / University of California / Berkeley / Johns Hopkins University / University of Cambridge Computer Laboratory / Ambient Authority / Designation Without Authority / Department of Defense / /

Person

Tyler Close / Karger / Bill Frantz / Ben Laurie / Van Horn / Carol / CAL-TSS / Dennis Horn / Chris Hibbert / Jonathan Shapiro Johns / Marc Stiegler / Alan Karp / Hal Finney / Norm Hardy / Bob / E. Dean Tribble / Object Capabilities / Terry Stanley / Bill Tulloh / Darius Bacon / Sue Butler / Schroeder / /

Position

Dean / Supervisor / Model / Representative / delegate to Bob / Butler / Van Horn’s Supervisor / /

Product

Address-Space Operating System / Address-Space / /

ProgrammingLanguage

Java / /

PublishedMedium

The Computer Journal / American Journal of Sociology / IEEE Software / /

Technology

object-oriented programming / Unix / random access / operating system / Operating Systems / access control list / Java / recombination / /

URL

http /

SocialTag