scispace - formally typeset
Open AccessBook

Capability-Based Computer Systems

Henry M. Levy
About
The article was published on 1984-01-01 and is currently open access. It has received 509 citations till now. The article focuses on the topics: Computer network programming & Software system.

read more

Citations
More filters
Journal ArticleDOI

Memory-Side Protection With a Capability Enforcement Co-Processor

TL;DR: A proof of concept implementation of a distributed object store (Redis) with CEP is presented and it is shown that CEP provides fine-grain protection while enabling direct memory access from application clients to the NVM, and that by doing so opens up important performance optimization opportunities.
Book ChapterDOI

Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA)

TL;DR: The CTSRD Project has sought to address concern through a clean-slate re-design project to create the Capability Hardware Enhanced RISC Instructions (CHERI) Instruction-Set Architecture (ISA), processor prototype, and software stack, providing strong architectural support for the principle of least privilege.

Decentralized Access Control in Networked File Systems

TL;DR: This survey provides a taxonomy of decentralized access control mechanisms intended for large scale, in both administrative domains and users, and identifies essential properties of such access control mechanism.
Proceedings ArticleDOI

CARAT CAKE: replacing paging via compiler/kernel cooperation

TL;DR: It is found that CARAT CAKE is able to achieve the functionality of paging (protection, mapping, and movement properties) with minimal overhead, and allows significant new benefits for systems including energy savings, larger L1 caches, and arbitrary granularity memory management.
Proceedings ArticleDOI

Relational access control with bivalent permissions in a social Web/collaboration architecture

TL;DR: It is argued for the usefulness of defining access control rules as objects in the target database, and for the necessity of resolving permission conflicts in a social Web/collaboration architecture.
Related Papers (5)