Object-capability model

Known as: Object-capability, Object capability model, Object capability 
The object-capability model is a computer security model. A capability describes a transferable right to perform one (or more) operations on a given… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1988-2017
024619882017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
In scenarios such as web programming, where code is linked together from multiple sources, object capability patterns (OCPs… (More)
  • figure 2
  • figure 7
Is this relevant?
2015
2015
CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating system to support fine-grained… (More)
  • figure 1
  • figure 2
  • figure 3
  • table III
  • table I
Is this relevant?
2014
2014
This document describes the rapidly maturing design for the Capability Hardware Enhanced RISC Instructions (CHERI) Instruction… (More)
  • figure 1.1
  • figure 2.1
  • table 3.1
  • figure 3.1
  • table 3.2
Is this relevant?
2014
2014
In this paper we present a new tool called DOCaT (Dynamic Object Capability Tracer), a model checker for JavaScript that detects… (More)
  • figure 3
  • figure 4
  • figure 5
  • figure 8
  • figure 10
Is this relevant?
2013
2013
The object-capability model is one of the industry standards adopted for the implementation of security policies for web-based… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The… (More)
Is this relevant?
2009
2009
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in… (More)
  • figure 1
  • figure 2
  • figure 6
Is this relevant?
1988
1988
Defining, creating, and manipulating persistent typed objects will be central activities in future software environments… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 2
  • figure 3
Is this relevant?