Back to Results
First PageMeta Content
Access control / Cross-platform software / CapDesk / Capability-based security / EROS / E / Confused deputy problem / Vulnerability / Java / Computing / Security / Computer security


Combex/Focused Research Topic 5/BAASNK Combex/Focused Research Topic 5/BAASNK Combex/Focused Research Topic 5/BAASNK Combex/Focused Research Topic 5/BAASNK
Add to Reading List

Document Date: 2005-08-18 16:56:47


Open Document

File Size: 1,08 MB

Share Result on Facebook

City

Houston / Oakland / /

Company

DarpaBrowser COMBEX INC. / MIT Press / Capability-Based Systems / Capability Based Security / Distributed Office Systems / Sun / IBM / Capability-Based Computer Systems / EBay / Local Networks / HP / Dangerous/Inappropriate Authority Can Be Prevented / Morningstar / Capability Based / Microsoft / Granma / /

Currency

USD / /

/

Event

M&A / FDA Phase / /

Facility

Java Swing Library / Princeton University / /

/

IndustryTerm

conventional security systems / non-capability protocols / word processor / software module / secure systems / software agents / ordinary unconfined applications / eBrowser software development environment / remarkable by-product / web browser / coordination site / basic Web Browser / software modules / software developers / file systems / mobile software agents / e-lang / software development / software sleight-of-hand / security technologies / software locks / by-products / basic document-processing applications / point-and-click computing platform / language discussion / active software component / web browser exercise / computing / individual software objects / capability-confined software / Web browsers / applications / Basic document processors / software components / web browser needs / natural and intuitive technology / capability protocol / perimeter security systems / hypothetical capability-confined mail tool / web servers / software modularization / conventional security technologies / unknown site / secure computing platform / operational software / software development environment / /

OperatingSystem

Unix / Microsoft Windows / Linux / KeyKOS / /

Organization

Princeton University / Least Authority / Authority for drag/drop / MIT / British government / Chinese intelligence / Department of Defense / Chinese government / /

Person

Bill Frantz / Formalism / Henry I. Boreen / Daniel G. Bobrow / Caplet / Carl Ellison / Peter Bishop / Rajiv Gupta / Henry Levy / Richard Stieger / Alan Karp / Norm Hardy / Richard Y. Kain / Carl Landwehr / Kenneth M. Kahn / Walter Ruzzo / Carl Hewitt / Jeffrey Ullman / Mark Miller / Jed E. Donnelley / Ron Rivest / Jack Dennis / Mark Granovetter / Michael Harrison / Marc Stiegler / B. Thomas / Eric Dean Tribble / Mark S. Miller / Guillermo Rozas / Larry Snyder / T. Ylonen / Matt Bishop / John Mitchell / Ajay Chander / Marc D. Stiegler / Drew Dean / /

/

Position

candidate for inspection / Universal Modular Actor / clerk / Butler / file manager / General / Author / Language Interpreter / capability-secure programmer / designer / word processor / Executive / Java programmer / representative / human analyst / secure distributed file manager / programmer / non-security-aware programmer / Manager / Java Security Manager / State Transition Model of Trust Management / capability-oriented programmer / capability programmer / page author / HTML author / conscientious programmer / Bishop / /

Product

Close99 / /

ProgrammingLanguage

Java / Visual Basic / HTML / /

ProvinceOrState

California / Texas / /

PublishedMedium

Communications of the ACM / Granma / American Journal of Sociology / /

Technology

Object-Oriented Programming / Linux / API / operating system / security technologies / Java / natural and intuitive technology / non-capability protocols / capability protocol / virtual machine / HTTP protocol / Unix / conventional security technologies / Operating Systems / TCP/IP / Basic document processors / firewall / capability-oriented protocol / word processor / network protocols / /

URL

http /

SocialTag