<--- Back to Details
First PageDocument Content
Software / System software / Computer architecture / Access control / POSIX / Unix / System calls / Sandbox / Capability-based security / File descriptor / Mandatory access control / Unix domain socket
Date: 2011-03-09 05:43:31
Software
System software
Computer architecture
Access control
POSIX
Unix
System calls
Sandbox
Capability-based security
File descriptor
Mandatory access control
Unix domain socket

fig-capsicum-processes.graffle

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 422,01 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

DocID: 1xUQb - View Document

Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

DocID: 1xT6c - View Document

Software / System software / Computer architecture / Disk file systems / Network file systems / File system / ZFS / Tar / XFS / Capability-based security / Filesystem in Userspace / Data

Hierarchical File Systems are Dead Margo Seltzer, Nicholas Murphy Harvard School of Engineering and Applied Sciences Abstract

DocID: 1rbB7 - View Document

Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

DocID: 1r6Eg - View Document

Business / Professional studies / Economy / Groupware / Multimodal interaction / Information economics / Social information processing / Business software / Collaborative software / Knowledge worker / Capability-based security / Object Process Methodology

Toward HighPerformance Organizations Role For Groupware Strategic

DocID: 1qIIY - View Document