Open AccessBook
Capability-Based Computer Systems
About:
The article was published on 1984-01-01 and is currently open access. It has received 509 citations till now. The article focuses on the topics: Computer network programming & Software system.read more
Citations
More filters
Compiling with proofs
George C. Necula,Peter Lee +1 more
TL;DR: This dissertation shows how standard decision procedures can be adapted so that they can produce detailed proofs of the proved predicates and also how these proofs can be encoded compactly and checked efficiently.
Proceedings ArticleDOI
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization
Robert N. M. Watson,Jonathan Woodruff,Peter G. Neumann,Simon W. Moore,Jonathan Anderson,David Chisnall,Nirav Dave,Brooks Davis,Khilan Gudka,Ben Laurie,Steven J. Murdoch,Robert Norton,Michael Roe,Stacey Son,Munraj Vadera +14 more
TL;DR: This work demonstrates multiple orders-of-magnitude improvement in scalability, simplified programmability, and resulting tangible security benefits as compared to compartmentalization based on pure Memory-Management Unit (MMU) designs.
Proceedings ArticleDOI
Microkernels meet recursive virtual machines
TL;DR: A software-based virtualizable architecture called Fluke that allows recursive virtual machines (virtual machines running on other virtual machines) to be implemented efficiently by a microkernel running on generic hardware.
Journal ArticleDOI
Improving the reliability of commodity operating systems
TL;DR: Nooks is a reliability subsystem that seeks to greatly enhance OS reliability by isolating the OS from driver failures, and represents a substantial step beyond the specialized architectures and type-safe languages required by previous efforts directed at safe extensibility.
Proceedings Article
Using Sparse Capabilities in a Distributed Operating System
TL;DR: A distributed operating system that includes capabilities for naming and protecting objects is reported, and a variety of the issues involved is outlined, and four different ways of dealing with access rights are presented.