scispace - formally typeset
Open AccessBook

Capability-Based Computer Systems

Henry M. Levy
About
The article was published on 1984-01-01 and is currently open access. It has received 509 citations till now. The article focuses on the topics: Computer network programming & Software system.

read more

Citations
More filters
Book ChapterDOI

Generation of Transmission Control Rules Compliant with Existing Access Control Policies

TL;DR: Access Control is a well known mechanism that allows access restriction to resources, Nevertheless, it does not provide notification when a resource is retransmitted to an unauthorized third party.
ReportDOI

Asbestos: Securing Untrusted Software with Interposition

TL;DR: The main goal of the Asbestos effort was to build an operating system that allows users to control applications using encapsulation, without having to understand the application security properties, and the prototype implementation relies mostly on Asbestos's mandatory labeling mechanism for security, not interposition.

The home needs an operating system

TL;DR: It is argued that heterogeneity is hindering technological innovation in the home—homes differ in terms of their devices and how those devices are connected and used, and to abstract these differences, it is proposed to develop a homewide operating system.

A survey of distributed capability file systems and their application to cloud environments

TL;DR: It is found that, while no existing capability-based distributed file system demonstrates all of the desirable security traits observed of smaller-scale capability systems, it should be possible to define and create one that does, using capabilities carefully designed to obey a set of known properties.

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5)

TL;DR: The Capability Hardware Enhanced RISC Instructions (CHERI) as mentioned in this paper instruction set is a hybrid capability-system architecture that adds new capability system primitives to a commodity 64-bit RISC ISA enabling software to efficiently implement fine-grained memory protection and a hardware-software object capability security model.
Related Papers (5)