Abstract
No abstract available.
Cited By
- Watson R, Chisnall D, Clarke J, Davis B, Filardo N, Laurie B, Moore S, Neumann P, Richardson A, Sewell P, Witaszczyk K and Woodruff J (2024). CHERI: Hardware-Enabled C/C++ Memory Protection at Scale, IEEE Security and Privacy, 22:4, (50-61), Online publication date: 1-Jul-2024.
- Georges A, Guéneau A, Van Strydonck T, Timany A, Trieu A, Devriese D and Birkedal L (2024). Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code, Journal of the ACM, 71:1, (1-59), Online publication date: 29-Feb-2024.
- Ghaffari F, Bertin E, Crespi N and Hatin J (2023). Distributed ledger technologies for authentication and access control in networking applications, Computer Science Review, 50:C, Online publication date: 1-Nov-2023.
- Samaniego M and Deters R Digital Twins and Blockchain for IoT Management Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, (64-74)
- Zhao S and Mashtizadeh A Metal: An Open Architecture for Developing Processor Features Proceedings of the 19th Workshop on Hot Topics in Operating Systems, (15-22)
- Bramley J, Jacob D, Lascu A, Singer J and Tratt L Picking a CHERI Allocator: Security and Performance Considerations Proceedings of the 2023 ACM SIGPLAN International Symposium on Memory Management, (111-123)
- Narayan S, Garfinkel T, Taram M, Rudek J, Moghimi D, Johnson E, Fallin C, Vahldiek-Oberwagner A, LeMay M, Sahita R, Tullsen D and Stefan D Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3, (266-281)
- Jacob D and Singer J Boehm-Demers-Weiser Garbage Collection on Morello Proceedings of the 19th International Conference on Managed Programming Languages and Runtimes, (150-151)
- Vijaykumar N, Olgun A, Kanellopoulos K, Bostanci F, Hassan H, Lotfi M, Gibbons P and Mutlu O (2022). MetaSys: A Practical Open-source Metadata Management System to Implement and Evaluate Cross-layer Optimizations, ACM Transactions on Architecture and Code Optimization, 19:2, (1-29), Online publication date: 30-Jun-2022.
- Georges A, Trieu A and Birkedal L (2022). Le temps des cerises: efficient temporal stack safety on capability machines using directed capabilities, Proceedings of the ACM on Programming Languages, 6:OOPSLA1, (1-30), Online publication date: 29-Apr-2022.
- Suchy B, Ghosh S, Kersnar D, Chai S, Huang Z, Nelson A, Cuevas M, Bernat A, Chaudhary G, Hardavellas N, Campanoni S and Dinda P CARAT CAKE: replacing paging via compiler/kernel cooperation Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, (98-114)
- Xia Y, Du D, Hua Z, Zang B, Chen H and Guan H (2022). Boosting Inter-process Communication with Architectural Support, ACM Transactions on Computer Systems, 39:1-4, (1-35), Online publication date: 30-Nov-2021.
- LeMay M, Rakshit J, Deutsch S, Durham D, Ghosh S, Nori A, Gaur J, Weiler A, Sultana S, Grewal K and Subramoney S Cryptographic Capability Computing MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture, (253-267)
- Roy A, Sural S, Majumdar A, Vaidya J and Atluri V (2021). Optimal Employee Recruitment in Organizations under Attribute-Based Access Control, ACM Transactions on Management Information Systems, 12:1, (1-24), Online publication date: 31-Mar-2021.
- Georges A, Guéneau A, Van Strydonck T, Timany A, Trieu A, Huyghebaert S, Devriese D and Birkedal L (2021). Efficient and provable local capability revocation using uninitialized capabilities, Proceedings of the ACM on Programming Languages, 5:POPL, (1-30), Online publication date: 4-Jan-2021.
- Choudhury V and Krishnaswami N (2020). Recovering purity with comonads and capabilities, Proceedings of the ACM on Programming Languages, 4:ICFP, (1-28), Online publication date: 2-Aug-2020.
- Gu J, Wu X, Li W, Liu N, Mi Z, Xia Y and Chen H Harmonizing performance and isolation in microkernels with efficient intra-kernel isolation and communication Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference, (401-417)
- Suchy B, Campanoni S, Hardavellas N and Dinda P CARAT: a case for virtual memory through compiler- and runtime-based address translation Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, (329-345)
- Randal A (2020). The Ideal Versus the Real, ACM Computing Surveys, 53:1, (1-31), Online publication date: 29-May-2020.
- Skorstengaard L, Devriese D and Birkedal L (2019). Reasoning about a Machine with Local Capabilities, ACM Transactions on Programming Languages and Systems, 42:1, (1-53), Online publication date: 31-Mar-2020.
- Lopriore L and Santone A (2020). Extended pointers for memory protection in single address space systems, Computers and Electrical Engineering, 82:C, Online publication date: 1-Mar-2020.
- Hu Y, Kumar S and Popa R Ghostor Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (851-878)
- Petracca G, Sun Y, Reineh A, McDaniel P, Grossklags J and Jaeger T Entrust Proceedings of the 28th USENIX Conference on Security Symposium, (567-584)
- Van Strydonck T, Piessens F and Devriese D (2019). Linear capabilities for fully abstract compilation of separation-logic-verified code, Proceedings of the ACM on Programming Languages, 3:ICFP, (1-29), Online publication date: 26-Jul-2019.
- Du D, Hua Z, Xia Y, Zang B and Chen H XPC Proceedings of the 46th International Symposium on Computer Architecture, (671-684)
- Lopriore L and Santone A (2019). Protected pointers to specify access privileges in distributed systems, Journal of Parallel and Distributed Computing, 126:C, (1-12), Online publication date: 1-Apr-2019.
- Azriel L, Humbel L, Achermann R, Richardson A, Hoffmann M, Mendelson A, Roscoe T, Watson R, Faraboschi P and Milojicic D (2019). Memory-Side Protection With a Capability Enforcement Co-Processor, ACM Transactions on Architecture and Code Optimization, 16:1, (1-26), Online publication date: 8-Mar-2019.
- Skorstengaard L, Devriese D and Birkedal L (2019). StkTokens: enforcing well-bracketed control flow and stack encapsulation using linear capabilities, Proceedings of the ACM on Programming Languages, 3:POPL, (1-28), Online publication date: 2-Jan-2019.
- Hunger C, Vilanova L, Papamanthou C, Etsion Y and Tiwari M (2018). DATS - Data Containers for Web Applications, ACM SIGPLAN Notices, 53:2, (722-736), Online publication date: 30-Nov-2018.
- Lopriore L (2018). Access right management by extended password capabilities, International Journal of Information Security, 17:5, (603-612), Online publication date: 1-Oct-2018.
- Patil V, Jatain N and Shyamasundar R Role of Apps in Undoing of Privacy Policies on Facebook Data and Applications Security and Privacy XXXII, (85-98)
- Wang T, Sambasivam S and Tuck J Hardware supported permission checks on persistent objects for performance and programmability Proceedings of the 45th Annual International Symposium on Computer Architecture, (466-478)
- Hunger C, Vilanova L, Papamanthou C, Etsion Y and Tiwari M DATS - Data Containers for Web Applications Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, (722-736)
- Tsai S and Zhang Y LITE Kernel RDMA Support for Datacenter Applications Proceedings of the 26th Symposium on Operating Systems Principles, (306-324)
- Wang T, Sambasivam S, Solihin Y and Tuck J Hardware supported persistent object address translation Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture, (800-812)
- Li Q, Lee P, Zhang P, Su P, He L, Ren K, Qi Li , Lee P, Peng Zhang , Purui Su , Liang He and Kui Ren (2017). Capability-Based Security Enforcement in Named Data Networking, IEEE/ACM Transactions on Networking, 25:5, (2719-2730), Online publication date: 1-Oct-2017.
- Alam H, Zhang T, Erez M and Etsion Y (2017). Do-It-Yourself Virtual Memory Translation, ACM SIGARCH Computer Architecture News, 45:2, (457-468), Online publication date: 14-Sep-2017.
- Alam H, Zhang T, Erez M and Etsion Y Do-It-Yourself Virtual Memory Translation Proceedings of the 44th Annual International Symposium on Computer Architecture, (457-468)
- Vilanova L, Jordà M, Navarro N, Etsion Y and Valero M Direct Inter-Process Communication (dIPC) Proceedings of the Twelfth European Conference on Computer Systems, (16-31)
- Gottesman Y and Etsion Y NeSC The 49th Annual IEEE/ACM International Symposium on Microarchitecture, (1-12)
- Olson L, Power J, Hill M and Wood D Border control Proceedings of the 48th International Symposium on Microarchitecture, (470-481)
- Chlipala A (2015). Ur/Web, ACM SIGPLAN Notices, 50:1, (153-165), Online publication date: 11-May-2015.
- Porter D, Bond M, Roy I, Mckinley K and Witchel E (2014). Practical Fine-Grained Information Flow Control Using Laminar, ACM Transactions on Programming Languages and Systems, 37:1, (1-51), Online publication date: 20-Jan-2015.
- Chlipala A Ur/Web Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (153-165)
- Vilanova L, Ben-Yehuda M, Navarro N, Etsion Y and Valero M (2014). CODOMs, ACM SIGARCH Computer Architecture News, 42:3, (469-480), Online publication date: 16-Oct-2014.
- Woodruff J, Watson R, Chisnall D, Moore S, Anderson J, Davis B, Laurie B, Neumann P, Norton R and Roe M (2014). The CHERI capability model, ACM SIGARCH Computer Architecture News, 42:3, (457-468), Online publication date: 16-Oct-2014.
- Seshadri S, Gahagan M, Bhaskaran S, Bunker T, De A, Jin Y, Liu Y and Swanson S Willow Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation, (67-80)
- Vijayakumar H, Ge X, Payer M and Jaeger T JIGSAW Proceedings of the 23rd USENIX conference on Security Symposium, (973-988)
- Vijayakumar H, Ge X and Jaeger T Policy models to protect resource retrieval Proceedings of the 19th ACM symposium on Access control models and technologies, (211-222)
- Vilanova L, Ben-Yehuda M, Navarro N, Etsion Y and Valero M CODOMs Proceeding of the 41st annual international symposium on Computer architecuture, (469-480)
- Woodruff J, Watson R, Chisnall D, Moore S, Anderson J, Davis B, Laurie B, Neumann P, Norton R and Roe M The CHERI capability model Proceeding of the 41st annual international symposium on Computer architecuture, (457-468)
- Jain B, Tsai C, John J and Porter D Practical techniques to obviate setuid-to-root binaries Proceedings of the Ninth European Conference on Computer Systems, (1-14)
- Wu Y, Sun J, Liu Y and Dong J Automatically partition software into least privilege components using dynamic data dependency analysis Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (323-333)
- Kwon A, Dhawan U, Smith J, Knight T and DeHon A Low-fat pointers Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (721-732)
- Braun B, Feldman A, Ren Z, Setty S, Blumberg A and Walfish M Verifying computations with state Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, (341-357)
- Kaminsky M and Dahlin M (2013). Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, 10.1145/2517349, Online publication date: 3-Nov-2013.
- Vijayakumar H, Schiffman J and Jaeger T Process firewalls Proceedings of the 8th ACM European Conference on Computer Systems, (57-70)
- Mycroft A and Voigt J Notions of aliasing and ownership Aliasing in Object-Oriented Programming, (59-83)
- Chandra S and Back M Faunus Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference, (1-6)
- King-Lacroix J and Martin A BottleCap Proceedings of the seventh ACM workshop on Scalable trusted computing, (45-54)
- Roesner F, Fogarty J and Kohno T User interface toolkit mechanisms for securing interface elements Proceedings of the 25th annual ACM symposium on User interface software and technology, (239-250)
- Crandall J and Oliveira D Holographic vulnerability studies Proceedings of the 2012 New Security Paradigms Workshop, (141-152)
- Lyle J, Paverd A, King-Lacroix J, Atzeni A, Virji H, Flechais I and Faily S Personal PKI for the Smart Device Era Revised Selected Papers of the 9th European Workshop on Public Key Infrastructures, Services and Applications - Volume 7868, (69-84)
- Dixon C, Mahajan R, Agarwal S, Brush A, Lee B, Saroiu S and Bahl P An operating system for the home Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, (25-25)
- Saghafi S, Fisler K and Krishnamurthi S Features and object capabilities Proceedings of the 11th annual international conference on Aspect-oriented Software Development, (25-34)
- Rotondi D and Piccione S Managing access control for things Proceedings of the 7th International Conference on Body Area Networks, (263-268)
- DeHon A, Karel B, Knight T, Malecha G, Montagu B, Morisset R, Morrisett G, Pierce B, Pollack R, Ray S, Shivers O, Smith J and Sullivan G Preliminary design of the SAFE platform Proceedings of the 6th Workshop on Programming Languages and Operating Systems, (1-5)
- Birgisson A, Russo A and Sabelfeld A Capabilities for information flow Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, (1-15)
- Tsai W, Li W, Sarjoughian H and Shao Q SimSaaS Proceedings of the 44th Annual Simulation Symposium, (77-86)
- Felt A, Finifter M, Weinberger J and Wagner D Diesel Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, (416-422)
- Denning P Virtual fault tolerance Dependable and Historic Computing, (251-260)
- Li Z and Wang X FIRM Proceedings of the 26th Annual Computer Security Applications Conference, (181-190)
- Dixon C, Mahajan R, Agarwal S, Brush A, Lee B, Saroiu S and Bahl V The home needs an operating system (and an app store) Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, (1-6)
- Cappos J, Dadgar A, Rasley J, Samuel J, Beschastnikh I, Barsan C, Krishnamurthy A and Anderson T Retaining sandbox containment despite bugs in privileged memory-safe code Proceedings of the 17th ACM conference on Computer and communications security, (212-223)
- Shriraman A and Dwarkadas S (2010). Sentry, ACM SIGARCH Computer Architecture News, 38:3, (407-418), Online publication date: 19-Jun-2010.
- Shriraman A and Dwarkadas S Sentry Proceedings of the 37th annual international symposium on Computer architecture, (407-418)
- Hasebe K, Mabuchi M and Matsushita A Capability-based delegation model in RBAC Proceedings of the 15th ACM symposium on Access control models and technologies, (109-118)
- Krishnamurthy A, Mettler A and Wagner D Fine-grained privilege separation for web applications Proceedings of the 19th international conference on World wide web, (551-560)
- Mabuchi M, Shinjo Y, Hasebe K, Sato A and Kato K CapaCon Proceedings of the 2010 ACM Symposium on Applied Computing, (706-712)
- Cai L, Machiraju S and Chen H Capauth Proceedings of the 29th conference on Information communications, (386-390)
- Tiwari M, Li X, Wassel H, Chong F and Sherwood T Execution leases Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, (493-504)
- Tootoonchian A, Saroiu S, Ganjali Y and Wolman A Lockr Proceedings of the 5th international conference on Emerging networking experiments and technologies, (169-180)
- Rahhal C, Skaf-Molli H, Molli P and Weiss S Multi-synchronous Collaborative Semantic Wikis Proceedings of the 10th International Conference on Web Information Systems Engineering, (115-129)
- Ignat C, Oster G and Molli P DooSo6 Proceedings of the 6th international conference on Cooperative design, visualization, and engineering, (56-63)
- Shirley J and Evans D The user is not the enemy Proceedings of the 2008 New Security Paradigms Workshop, (33-45)
- Geambasu R, Gribble S and Levy H CloudViews Proceedings of the 2009 conference on Hot topics in cloud computing
- Roy I, Porter D, Bond M, McKinley K and Witchel E Laminar Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, (63-74)
- Roy I, Porter D, Bond M, McKinley K and Witchel E (2009). Laminar, ACM SIGPLAN Notices, 44:6, (63-74), Online publication date: 28-May-2009.
- Zeldovich N, Kannan H, Dalton M and Kozyrakis C Hardware enforcement of application security policies using tagged memory Proceedings of the 8th USENIX conference on Operating systems design and implementation, (225-240)
- Miltchev S, Smith J, Prevelakis V, Keromytis A and Ioannidis S (2008). Decentralized access control in distributed file systems, ACM Computing Surveys, 40:3, (1-30), Online publication date: 1-Aug-2008.
- Geambasu R, Cheung C, Moshchuk A, Gribble S and Levy H Organizing and sharing distributed personal web-service data Proceedings of the 17th international conference on World Wide Web, (755-764)
- Álvarez Gutiérrez D and Soler F Applying lightweight flexible virtual machines to extensible embedded systems Proceedings of the 1st workshop on Isolation and integration in embedded systems, (23-28)
- Leung A, Miller E and Jones S Scalable security for petascale parallel file systems Proceedings of the 2007 ACM/IEEE conference on Supercomputing, (1-12)
- Geambasu R, Balazinska M, Gribble S and Levy H Homeviews Proceedings of the 2007 ACM SIGMOD international conference on Management of data, (235-246)
- Black A, Hutchinson N, Jul E and Levy H The development of the Emerald programming language Proceedings of the third ACM SIGPLAN conference on History of programming languages, (11-1-11-51)
- Irvine C and Levitt K Trusted hardware Proceedings of the 44th annual Design Automation Conference, (1-4)
- Hunt G and Larus J (2007). Singularity, ACM SIGOPS Operating Systems Review, 41:2, (37-49), Online publication date: 1-Apr-2007.
- Sandhu R, Zhang X, Ranganathan K and Covington M (2006). Client-side access control enforcement using trusted computing and PEI models, Journal of High Speed Networks, 15:3, (229-245), Online publication date: 1-Jul-2006.
- Witchel E, Rhee J and Asanović K Mondrix Proceedings of the twentieth ACM symposium on Operating systems principles, (31-44)
- Witchel E, Rhee J and Asanović K (2005). Mondrix, ACM SIGOPS Operating Systems Review, 39:5, (31-44), Online publication date: 20-Oct-2005.
- Krohn M, Efstathopoulos P, Frey C, Kaashoek F, Kohler E, Mazières D, Morris R, Osborne M, VanDeBogart S and Ziegler D Make least privilege a right (not a privilege) Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10, (21-21)
- Sandhu R and Zhang X Peer-to-peer access control architecture using trusted computing technology Proceedings of the tenth ACM symposium on Access control models and technologies, (147-158)
- Udzir N, Wood A and Jacob J Coordination with multicapabilities Proceedings of the 7th international conference on Coordination Models and Languages, (79-93)
- Crandall J and Chong F Minos Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture, (221-232)
- Zhou P, Qin F, Liu W, Zhou Y and Torrellas J iWatcher Proceedings of the 31st annual international symposium on Computer architecture
- Meyer M (2004). A Novel Processor Architecture with Exact Tag-Free Pointers, IEEE Micro, 24:3, (46-55), Online publication date: 1-May-2004.
- Zhou P, Qin F, Liu W, Zhou Y and Torrellas J (2004). iWatcher, ACM SIGARCH Computer Architecture News, 32:2, (224), Online publication date: 2-Mar-2004.
- Swift M, Bershad B and Levy H (2003). Improving the reliability of commodity operating systems, ACM SIGOPS Operating Systems Review, 37:5, (207-222), Online publication date: 1-Dec-2003.
- Fu Y, Chase J, Chun B, Schwab S and Vahdat A (2003). SHARP, ACM SIGOPS Operating Systems Review, 37:5, (133-148), Online publication date: 1-Dec-2003.
- Swift M, Bershad B and Levy H Improving the reliability of commodity operating systems Proceedings of the nineteenth ACM symposium on Operating systems principles, (207-222)
- Fu Y, Chase J, Chun B, Schwab S and Vahdat A SHARP Proceedings of the nineteenth ACM symposium on Operating systems principles, (133-148)
- Abendroth J and Jensen C Partial outsourcing Proceedings of the eighth ACM symposium on Access control models and technologies, (134-141)
- Kallahalla M, Riedel E, Swaminathan R, Wang Q and Fu K Plutus Proceedings of the 2nd USENIX conference on File and storage technologies, (3-3)
- Abendroth J and Jensen C A unified security framework for networked applications Proceedings of the 2003 ACM symposium on Applied computing, (351-357)
- Frailey D Computer architecture Encyclopedia of Computer Science, (304-319)
- Gehringer E Capability-based addressing Encyclopedia of Computer Science, (194-196)
- Witchel E, Cates J and Asanović K (2002). Mondrian memory protection, ACM SIGOPS Operating Systems Review, 36:5, (304-316), Online publication date: 1-Dec-2002.
- Witchel E, Cates J and Asanović K (2002). Mondrian memory protection, ACM SIGARCH Computer Architecture News, 30:5, (304-316), Online publication date: 1-Dec-2002.
- Palacz K, Vitek J, Czajkowski G and Daynès L (2002). Incommunicado, ACM SIGPLAN Notices, 37:11, (262-274), Online publication date: 17-Nov-2002.
- Palacz K, Vitek J, Czajkowski G and Daynès L Incommunicado Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (262-274)
- Witchel E, Cates J and Asanović K Mondrian memory protection Proceedings of the 10th international conference on Architectural support for programming languages and operating systems, (304-316)
- Witchel E, Cates J and Asanović K (2002). Mondrian memory protection, ACM SIGPLAN Notices, 37:10, (304-316), Online publication date: 1-Oct-2002.
- Lopriore L (2002). Access Control Mechanisms in a Distributed, Persistent Memory System, IEEE Transactions on Parallel and Distributed Systems, 13:10, (1066-1083), Online publication date: 1-Oct-2002.
- Shapiro J and Hardy N (2002). EROS, IEEE Software, 19:1, (26-33), Online publication date: 1-Jan-2002.
- Chander A, Mitchell J and Dean D A State-Transition Model of Trust Management and Access Control Proceedings of the 14th IEEE workshop on Computer Security Foundations
- Shapiro J, Smith J and Farber D (1999). EROS, ACM SIGOPS Operating Systems Review, 33:5, (170-185), Online publication date: 12-Dec-1999.
- Shapiro J, Smith J and Farber D EROS Proceedings of the seventeenth ACM symposium on Operating systems principles, (170-185)
- Vitek J and Bokowski B (1999). Confined types, ACM SIGPLAN Notices, 34:10, (82-96), Online publication date: 1-Oct-1999.
- Vitek J and Bokowski B Confined types Proceedings of the 14th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (82-96)
- Hawblitzel C, Chang C, Czajkowski G, Hu D and von Eicken T Implementing multiple protection domains in java Proceedings of the annual conference on USENIX Annual Technical Conference, (22-22)
- Riechmann T and Hauck F Meta objects for access control Proceedings of the 1998 workshop on New security paradigms, (30-38)
- Riechmann T and Hauck F Meta objects for access control Proceedings of the 1997 workshop on New security paradigms, (17-22)
- Wallach D, Balfanz D, Dean D and Felten E (1997). Extensible security architectures for Java, ACM SIGOPS Operating Systems Review, 31:5, (116-128), Online publication date: 1-Dec-1997.
- Wallach D, Balfanz D, Dean D and Felten E Extensible security architectures for Java Proceedings of the sixteenth ACM symposium on Operating systems principles, (116-128)
- Hagimont D and Ismail L A protection scheme for mobile agents on Java Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, (215-222)
- Rousseau L and Natkin S A Framework of Secure Object System Architecture Proceedings of the 3rd Workshop on Object-Oriented Real-Time Dependable Systems - (WORDS '97)
- Hagimont D, Mossière J and Hemming C Hidden capabilities Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, (219-223)
- Berman A, Bourassa V and Selberg E TRON Proceedings of the USENIX 1995 Technical Conference Proceedings, (14-14)
- Carter N, Keckler S and Dally W (1994). Hardware support for fast capability-based addressing, ACM SIGOPS Operating Systems Review, 28:5, (319-327), Online publication date: 1-Dec-1994.
- Carter N, Keckler S and Dally W Hardware support for fast capability-based addressing Proceedings of the sixth international conference on Architectural support for programming languages and operating systems, (319-327)
- Carter N, Keckler S and Dally W (1994). Hardware support for fast capability-based addressing, ACM SIGPLAN Notices, 29:11, (319-327), Online publication date: 1-Nov-1994.
- Scholerman S, Miller L, Tenner J, Tomanek S and Zolliker M (1993). Relational database integration in the IBM AS/400, ACM SIGMOD Record, 22:4, (5-10), Online publication date: 1-Dec-1993.
- Frantz W and Landau C Object oriented transaction processing in the KeyKOS microkernel USENIX Symposium on USENIX Microkernels and Other Kernel Architectures Symposium - Volume 4, (2-2)
- Booch G (1992). The end of objects and the last programmer (Invited talk), ACM SIGPLAN OOPS Messenger, 4:2, (3-8), Online publication date: 1-Apr-1993.
- Booch G The end of objects and the last programmer (Invited talk) Addendum to the proceedings on Object-oriented programming systems, languages, and applications (Addendum), (3-8)
- Chase J, Levy H, Lazowska E and Baker-Harvey M (1992). Lightweight shared objects in a 64-bit operating system, ACM SIGPLAN Notices, 27:10, (397-413), Online publication date: 31-Oct-1992.
- Chase J, Levy H, Lazowska E and Baker-Harvey M Lightweight shared objects in a 64-bit operating system Conference proceedings on Object-oriented programming systems, languages, and applications, (397-413)
- Auerbach J, Bacon D, Goldberg A, Goldszmidt G, Kennedy M, Lowry A, Russell J, Silverman W, Strom R, Yellin D and Yemini S High-level language support for programming distributed systems Proceedings of the 1991 conference of the Centre for Advanced Studies on Collaborative research, (173-196)
- Bergin J (1990). Coatroom: an ADT which is useful in implementation of object oriented programming, ACM SIGCSE Bulletin, 22:3, (45-ff.), Online publication date: 1-Aug-1990.
- Lazzerini B and Lopriore L (1989). Abstraction Mechanisms for Event Control in Program Debugging, IEEE Transactions on Software Engineering, 15:7, (890-901), Online publication date: 1-Jul-1989.
- Bjornerstedt A and Britts S (1988). AVANCE: an object management system, ACM SIGPLAN Notices, 23:11, (206-221), Online publication date: 1-Nov-1988.
- Bjornerstedt A and Britts S AVANCE: an object management system Conference proceedings on Object-oriented programming systems, languages and applications, (206-221)
- Cheriton D and Wolf M Extensions for multi-module records in conventional programming languages Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, (296-306)
- Jacobson I (1986). Language support for changeable large real time systems, ACM SIGPLAN Notices, 21:11, (377-384), Online publication date: 1-Nov-1986.
- Jacobson I Language support for changeable large real time systems Conference proceedings on Object-oriented programming systems, languages and applications, (377-384)
- Hardy N (1985). KeyKOS architecture, ACM SIGOPS Operating Systems Review, 19:4, (8-25), Online publication date: 1-Oct-1985.
- Johnson H, Koegel J and Koegel R A secure distributed capability based system (extended abstract) Proceedings of the 1985 ACM annual conference on The range of computing : mid-80's perspective: mid-80's perspective, (392-402)
- Waguespack L A structural computer system resource model for teaching computer organization Proceedings of the sixteenth SIGCSE technical symposium on Computer science education, (63-67)
- Waguespack L (1985). A structural computer system resource model for teaching computer organization, ACM SIGCSE Bulletin, 17:1, (63-67), Online publication date: 1-Mar-1985.
- Lopriore L (1984). Capability Based Tagged Architectures, IEEE Transactions on Computers, 33:9, (786-803), Online publication date: 1-Sep-1984.
Index Terms
- Capability-Based Computer Systems
Please enable JavaScript to view thecomments powered by Disqus.