scispace - formally typeset
Open AccessBook

Capability-Based Computer Systems

Henry M. Levy
About
The article was published on 1984-01-01 and is currently open access. It has received 509 citations till now. The article focuses on the topics: Computer network programming & Software system.

read more

Citations
More filters
Proceedings ArticleDOI

Security In Keykos

TL;DR: KeyKOS's architecture combines several unique features to achieve simple and effective protection mechanisms with a very small amount of privileged code, putting particular emphasis on the protection mechanisms which support security.

CHERI: a research platform deconflating hardware virtualisation and protection

TL;DR: Capability Hardware Enhanced RISC Instructions (CHERI) extend RISC ISAs to support greater software compartmentalisation and provides fine-grained compartmentalization within address spaces while maintaining software backward compatibility, which will allow the incremental deployment of fine- grained compartmentality in both the authors' most trusted and least trustworthy C-language software stacks.
Journal ArticleDOI

Capability Based Tagged Architectures

TL;DR: An architecture is presented which incorporates capability based addressing and memory tagging features and it defines three kinds of mechanisms for the implementation of object types, which correspond to as many different levels of abstraction.

Reasoning about object capabilities with logical relations and effect parametricity - Technical Report including proofs and details

TL;DR: A logical relation is defined for a core calculus of JavaScript that better characterises capability-safety and supports evolvable invariants on shared data structures, capabilities with restricted authority over them and isolated components with restricted communication channels.
Patent

Dynamic delegation chain for runtime adaptation of a code unit to an environment

TL;DR: A dynamic delegation chain of executor objects can, at runtime, adapt code units to be executed as isolated computations prior to their execution to comport with current state of an environment as mentioned in this paper.
Related Papers (5)