1995
DOI: 10.1145/208639.208641
|View full text |Cite
|
Sign up to set email alerts
|

A brief essay on capabilities

Abstract: In the course of the last three decades, capabilities have been successfully used to implement protection systems in multiples scenarios and platforms. Although the basic idea remains the same, a wide variety of techniques have been used in the implementation and administration of capabilities. As new paradigms emerged, the concept of capabilities has shown to scale very well with the change of models. As a matter of fact, several modern computational environments (particularly distributed ones) use some sort … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2007
2007
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…Capabilities need to be segregated into protected memory regions [5], [19], [37]. This is necessary to prevent a subject that holds a given capability from modifying this capability, e.g.…”
Section: Capabilities and Access Control Listsmentioning
confidence: 99%
“…Capabilities need to be segregated into protected memory regions [5], [19], [37]. This is necessary to prevent a subject that holds a given capability from modifying this capability, e.g.…”
Section: Capabilities and Access Control Listsmentioning
confidence: 99%
“…Capabilities should be segregated in memory, so that their internal representation is inaccessible to subjects [5]. This is necessary to prevent a subject from tampering with an existing capability to amplify the access rights it contains, or even forging a capability from scratch.…”
Section: Access Privilege Specificationmentioning
confidence: 99%
“…Similarly, we must prevent processes from forging new capabilities for existing objects from scratch, thereby gaining access to these objects. Several solutions to this segregation problem [4,12] have been devised and actually implemented in existing systems. In a tagged memory environment, a one-bit tag can be associated with each memory cell to specify whether this cell contains a capability or an ordinary data item [8,11,21].…”
Section: Capabilities and Password Capabilitiesmentioning
confidence: 99%
“…In our approach, o-pointers are segregated in memory by taking advantage of cryptography [4]. We associate an encryption key with each object and a password with each protection domain.…”
Section: Capabilities and Password Capabilitiesmentioning
confidence: 99%