scispace - formally typeset
Open AccessBook

Capability-Based Computer Systems

Henry M. Levy
About
The article was published on 1984-01-01 and is currently open access. It has received 509 citations till now. The article focuses on the topics: Computer network programming & Software system.

read more

Citations
More filters
Proceedings ArticleDOI

Peer-to-peer access control architecture using trusted computing technology

TL;DR: This paper proposes a trusted computing architecture based on an abstract layer of trusted hardware which can be constructed with emerging trusted computing technologies, and introduces a trusted reference monitor (TRM) that can enforce various policies on behalf of object owners.
Proceedings ArticleDOI

Willow: a user-programmable SSD

TL;DR: The potential of making programmability a central feature of the SSD interface is explored, and it is found that defining SSD semantics in software is easy and beneficial, and that Willow makes it feasible for a wide range of IO-intensive applications to benefit from a customized SSD interface.
Journal ArticleDOI

iWatcher: Efficient Architectural Support for Software Debugging

TL;DR: The Intelligent Watcher (iWatcher), novel architectural support to monitor dynamic execution with minimal overhead, automatically, and flexibly, and Thread-Level Speculation (TLS), which is effective at reducing overheads for programs with substantial monitoring.
Proceedings ArticleDOI

Confined types

TL;DR: A verifier is implemented which performs a modular analysis of Java programs and provides a static guarantee that confinement is respected, and two mechanisms: confined types to impose static scoping on dynamic object references and anonymous methods which are methods that do not reveal the identity of the current instance.
Proceedings ArticleDOI

LITE Kernel RDMA Support for Datacenter Applications

TL;DR: LITE, a Local Indirection TiEr for RDMA in the Linux kernel that virtualizes native RDMA into a flexible, high-level, easy-to-use abstraction and allows applications to safely share resources is built.
Related Papers (5)