Open AccessBook
Capability-Based Computer Systems
About:
The article was published on 1984-01-01 and is currently open access. It has received 509 citations till now. The article focuses on the topics: Computer network programming & Software system.read more
Citations
More filters
Proceedings ArticleDOI
Security In Keykos
TL;DR: KeyKOS's architecture combines several unique features to achieve simple and effective protection mechanisms with a very small amount of privileged code, putting particular emphasis on the protection mechanisms which support security.
CHERI: a research platform deconflating hardware virtualisation and protection
Robert N. M. Watson,Peter G. Neumann,Jonathan Woodruff,Jonathan Anderson,Ross Anderson,Nirav Dave,Ben Laurie,Simon W. Moore,Steven J. Murdoch,Philip Paeps,Michael Roe,Hassen Saïdi +11 more
TL;DR: Capability Hardware Enhanced RISC Instructions (CHERI) extend RISC ISAs to support greater software compartmentalisation and provides fine-grained compartmentalization within address spaces while maintaining software backward compatibility, which will allow the incremental deployment of fine- grained compartmentality in both the authors' most trusted and least trustworthy C-language software stacks.
Journal ArticleDOI
Capability Based Tagged Architectures
TL;DR: An architecture is presented which incorporates capability based addressing and memory tagging features and it defines three kinds of mechanisms for the implementation of object types, which correspond to as many different levels of abstraction.
Reasoning about object capabilities with logical relations and effect parametricity - Technical Report including proofs and details
TL;DR: A logical relation is defined for a core calculus of JavaScript that better characterises capability-safety and supports evolvable invariants on shared data structures, capabilities with restricted authority over them and isolated components with restricted communication channels.
Patent
Dynamic delegation chain for runtime adaptation of a code unit to an environment
TL;DR: A dynamic delegation chain of executor objects can, at runtime, adapt code units to be executed as isolated computations prior to their execution to comport with current state of an environment as mentioned in this paper.