Paradigm Regained: Abstraction Mechanisms for Access Control

@inproceedings{Miller2003ParadigmRA,
  title={Paradigm Regained: Abstraction Mechanisms for Access Control},
  author={Mark S. Miller and Jonathan S. Shapiro},
  booktitle={ASIAN},
  year={2003}
}
Access control systems must be evaluated in part on how well they enable one to distribute the access rights needed for cooperation, while simultaneously limiting the propagation of rights which would create vulnerabilities. Analysis to date implicitly assumes access is controlled only by manipulating a system's protection state—the arrangement of the access graph. Because of the limitations of this analysis, capability systems have been “proven” unable to enforce some basic policies… CONTINUE READING
Highly Cited
This paper has 81 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 54 extracted citations

Securing services in nomadic computing environments

Information & Software Technology • 2008
View 3 Excerpts
Highly Influenced

An Overview of the Annex System

Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) • 2007
View 4 Excerpts
Highly Influenced

82 Citations

0510'06'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 82 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 47 references

On the Inability of an Unmodified Capability Machine to Enforce the *-Property

W. E. Boebert
Proceedings of 7th DoD/NBS Computer Security Conference, • 1984
View 4 Excerpts
Highly Influenced

Protection in Programming Languages

Commun. ACM • 1973
View 6 Excerpts
Highly Influenced

The keykos/keysafe system design

View 3 Excerpts
Highly Influenced

Verifying the EROS Confinement Mechanism

IEEE Symposium on Security and Privacy • 2000

Similar Papers

Loading similar papers…