Capability-based security

Known as: Capability security, Capability system, Capability architecture 
Capability-based security is a concept in the design of secure computing systems, one of the existing security models. A capability (known in some… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Named data networking NDN enhances traditional IP networking by supporting in-network content caching for better bandwidth usage… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Resource and information protection plays a relevant role in distributed systems like the ones present in the Internet of Things… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
The first exa-scale computers are predicted to arrive in 2018 but we are currently unable to fully utilise such massive… (More)
  • figure 2.1
  • figure 3.1
  • figure 3.2
  • figure 3.3
  • figure 4.1
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Referencing outside the bounds of an array or buffer is a common source of bugs and security vulnerabilities in today's software… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The evolution of the Internet towards the Internet of Things is being deployed in emerging cyberphysical systems such as access… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Unstable market conditions caused by innovation and increasing intensity and diversity of competition have resulted in… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We address three common misconceptions about capability-based systems: the Equivalence Myth (access control list systems and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Mobile code technologies such as Java, JavaScript, and ActiveX generally limit all programs to a single restrictive security… (More)
  • figure 1
  • figure 4
  • figure 6
  • figure 7
  • figure 8
Is this relevant?
1997
1997
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming… (More)
  • figure 2.1
  • figure 2.2
  • figure 3.2
  • figure 3.1
  • figure 3.3
Is this relevant?
1989
1989
  • Li Gong
  • Operating Systems Review
  • 1989
Hogan in her recent paper presented the requirements and the characteristics of operating systems to realize the principle of… (More)
Is this relevant?