Proceedings of 16th International Conference on Distributed Computing Systems
DOI: 10.1109/icdcs.1996.507926
|View full text |Cite
|
Sign up to set email alerts
|

Hidden software capabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 5 publications
0
15
0
Order By: Relevance
“…Confused deputy attacks can be avoided using a capabilitybased access control model such as [13,14]. By binding possible operations of a process directly to objects, these models prevents attacks such as those based on symbolic links or file renaming.…”
Section: Related Workmentioning
confidence: 99%
“…Confused deputy attacks can be avoided using a capabilitybased access control model such as [13,14]. By binding possible operations of a process directly to objects, these models prevents attacks such as those based on symbolic links or file renaming.…”
Section: Related Workmentioning
confidence: 99%
“…The active software capability model is inspired by work on hidden software capabilities in the SIRAC project at IN-RIA Rhône-Alpes [9,12]. Hidden software capabilities separate security from the functional aspects of an application, by delegating management and exchange of capabilities to protection interfaces interposed between client and server.…”
Section: Proxy-based Securitymentioning
confidence: 99%
“…This enables a proxy-based approach to security [19,9,2]. The client downloads the ASCap proxy from the security server and instantiates it.…”
Section: Security Mechanism Layermentioning
confidence: 99%
See 1 more Smart Citation
“…The protection model described in the following was originally developed for a distributed shared memory system called ARIAS [6,4]. Our preliminary experiences with applications written for ARIAS and discussions with colleagues who develop the OLAN distributed application configuration language [1], has convinced us of its general applicability for software reuse.…”
Section: Protection Modelmentioning
confidence: 99%