scispace - formally typeset
Open AccessBook

Capability-Based Computer Systems

Henry M. Levy
About
The article was published on 1984-01-01 and is currently open access. It has received 509 citations till now. The article focuses on the topics: Computer network programming & Software system.

read more

Citations
More filters
Proceedings ArticleDOI

Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries

TL;DR: Categorizing vulnerabilities based on this view, as opposed to the types of categories that have been used in past vulnerability studies, makes vulnerability types more easily generalizable and avoids problems where vulnerabilities could be put in multiple categories.
Journal ArticleDOI

Performance Improvements on the Network Security Protocols

TL;DR: A security management system is introduced in order to improve the handshaking process by making use of SSL/TLS client-side session caching, and allowing trusted users to share sessions with others.
Posted ContentDOI

Designing with Static Capabilities and Effects: Use, Mention, and Invariants

TL;DR: The trade-offs between static capabilities (specifically reference capabilities) and effect systems are discussed, articulating the challenges each approach tends to have in isolation, and how these are sometimes mitigated.

Active Privilege Management for Distributed Access Control Systems

TL;DR: The Event-based Distributed Scalable Authorisation Control architecture for the 21st century (EDSAC21, or just EDSAC) is presented along with its four design layers and is intended to have widespread applicability as the basis for designing next-generation security middleware and implementing distributed, dynamic privilege management.

Design and Evaluation of an Extensible Web & Telephony Server based on the J-Kernel

TL;DR: The design and performance of the J-Server, an integrated web and telephony server that allows untrusted Java servlets to be dynamically uploaded to extend the server''s functionality, are described.
Related Papers (5)