Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
Capability-Based Computer SystemsJanuary 1984
Publisher:
  • Butterworth-Heinemann
  • 313 Washington Street Newton, MA
  • United States
ISBN:978-0-932376-22-0
Published:01 January 1984
Pages:
250
Skip Bibliometrics Section
Reflects downloads up to 10 Nov 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Watson R, Chisnall D, Clarke J, Davis B, Filardo N, Laurie B, Moore S, Neumann P, Richardson A, Sewell P, Witaszczyk K and Woodruff J (2024). CHERI: Hardware-Enabled C/C++ Memory Protection at Scale, IEEE Security and Privacy, 22:4, (50-61), Online publication date: 1-Jul-2024.
  2. ACM
    Georges A, Guéneau A, Van Strydonck T, Timany A, Trieu A, Devriese D and Birkedal L (2024). Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code, Journal of the ACM, 71:1, (1-59), Online publication date: 29-Feb-2024.
  3. Ghaffari F, Bertin E, Crespi N and Hatin J (2023). Distributed ledger technologies for authentication and access control in networking applications, Computer Science Review, 50:C, Online publication date: 1-Nov-2023.
  4. ACM
    Samaniego M and Deters R Digital Twins and Blockchain for IoT Management Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, (64-74)
  5. ACM
    Zhao S and Mashtizadeh A Metal: An Open Architecture for Developing Processor Features Proceedings of the 19th Workshop on Hot Topics in Operating Systems, (15-22)
  6. ACM
    Bramley J, Jacob D, Lascu A, Singer J and Tratt L Picking a CHERI Allocator: Security and Performance Considerations Proceedings of the 2023 ACM SIGPLAN International Symposium on Memory Management, (111-123)
  7. ACM
    Narayan S, Garfinkel T, Taram M, Rudek J, Moghimi D, Johnson E, Fallin C, Vahldiek-Oberwagner A, LeMay M, Sahita R, Tullsen D and Stefan D Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3, (266-281)
  8. ACM
    Jacob D and Singer J Boehm-Demers-Weiser Garbage Collection on Morello Proceedings of the 19th International Conference on Managed Programming Languages and Runtimes, (150-151)
  9. ACM
    Vijaykumar N, Olgun A, Kanellopoulos K, Bostanci F, Hassan H, Lotfi M, Gibbons P and Mutlu O (2022). MetaSys: A Practical Open-source Metadata Management System to Implement and Evaluate Cross-layer Optimizations, ACM Transactions on Architecture and Code Optimization, 19:2, (1-29), Online publication date: 30-Jun-2022.
  10. ACM
    Georges A, Trieu A and Birkedal L (2022). Le temps des cerises: efficient temporal stack safety on capability machines using directed capabilities, Proceedings of the ACM on Programming Languages, 6:OOPSLA1, (1-30), Online publication date: 29-Apr-2022.
  11. ACM
    Suchy B, Ghosh S, Kersnar D, Chai S, Huang Z, Nelson A, Cuevas M, Bernat A, Chaudhary G, Hardavellas N, Campanoni S and Dinda P CARAT CAKE: replacing paging via compiler/kernel cooperation Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, (98-114)
  12. ACM
    Xia Y, Du D, Hua Z, Zang B, Chen H and Guan H (2022). Boosting Inter-process Communication with Architectural Support, ACM Transactions on Computer Systems, 39:1-4, (1-35), Online publication date: 30-Nov-2021.
  13. ACM
    LeMay M, Rakshit J, Deutsch S, Durham D, Ghosh S, Nori A, Gaur J, Weiler A, Sultana S, Grewal K and Subramoney S Cryptographic Capability Computing MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture, (253-267)
  14. ACM
    Roy A, Sural S, Majumdar A, Vaidya J and Atluri V (2021). Optimal Employee Recruitment in Organizations under Attribute-Based Access Control, ACM Transactions on Management Information Systems, 12:1, (1-24), Online publication date: 31-Mar-2021.
  15. ACM
    Georges A, Guéneau A, Van Strydonck T, Timany A, Trieu A, Huyghebaert S, Devriese D and Birkedal L (2021). Efficient and provable local capability revocation using uninitialized capabilities, Proceedings of the ACM on Programming Languages, 5:POPL, (1-30), Online publication date: 4-Jan-2021.
  16. ACM
    Choudhury V and Krishnaswami N (2020). Recovering purity with comonads and capabilities, Proceedings of the ACM on Programming Languages, 4:ICFP, (1-28), Online publication date: 2-Aug-2020.
  17. Gu J, Wu X, Li W, Liu N, Mi Z, Xia Y and Chen H Harmonizing performance and isolation in microkernels with efficient intra-kernel isolation and communication Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference, (401-417)
  18. ACM
    Suchy B, Campanoni S, Hardavellas N and Dinda P CARAT: a case for virtual memory through compiler- and runtime-based address translation Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, (329-345)
  19. ACM
    Randal A (2020). The Ideal Versus the Real, ACM Computing Surveys, 53:1, (1-31), Online publication date: 29-May-2020.
  20. ACM
    Skorstengaard L, Devriese D and Birkedal L (2019). Reasoning about a Machine with Local Capabilities, ACM Transactions on Programming Languages and Systems, 42:1, (1-53), Online publication date: 31-Mar-2020.
  21. Lopriore L and Santone A (2020). Extended pointers for memory protection in single address space systems, Computers and Electrical Engineering, 82:C, Online publication date: 1-Mar-2020.
  22. Hu Y, Kumar S and Popa R Ghostor Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (851-878)
  23. Petracca G, Sun Y, Reineh A, McDaniel P, Grossklags J and Jaeger T Entrust Proceedings of the 28th USENIX Conference on Security Symposium, (567-584)
  24. ACM
    Van Strydonck T, Piessens F and Devriese D (2019). Linear capabilities for fully abstract compilation of separation-logic-verified code, Proceedings of the ACM on Programming Languages, 3:ICFP, (1-29), Online publication date: 26-Jul-2019.
  25. ACM
    Du D, Hua Z, Xia Y, Zang B and Chen H XPC Proceedings of the 46th International Symposium on Computer Architecture, (671-684)
  26. Lopriore L and Santone A (2019). Protected pointers to specify access privileges in distributed systems, Journal of Parallel and Distributed Computing, 126:C, (1-12), Online publication date: 1-Apr-2019.
  27. ACM
    Azriel L, Humbel L, Achermann R, Richardson A, Hoffmann M, Mendelson A, Roscoe T, Watson R, Faraboschi P and Milojicic D (2019). Memory-Side Protection With a Capability Enforcement Co-Processor, ACM Transactions on Architecture and Code Optimization, 16:1, (1-26), Online publication date: 8-Mar-2019.
  28. ACM
    Skorstengaard L, Devriese D and Birkedal L (2019). StkTokens: enforcing well-bracketed control flow and stack encapsulation using linear capabilities, Proceedings of the ACM on Programming Languages, 3:POPL, (1-28), Online publication date: 2-Jan-2019.
  29. ACM
    Hunger C, Vilanova L, Papamanthou C, Etsion Y and Tiwari M (2018). DATS - Data Containers for Web Applications, ACM SIGPLAN Notices, 53:2, (722-736), Online publication date: 30-Nov-2018.
  30. Lopriore L (2018). Access right management by extended password capabilities, International Journal of Information Security, 17:5, (603-612), Online publication date: 1-Oct-2018.
  31. Patil V, Jatain N and Shyamasundar R Role of Apps in Undoing of Privacy Policies on Facebook Data and Applications Security and Privacy XXXII, (85-98)
  32. Wang T, Sambasivam S and Tuck J Hardware supported permission checks on persistent objects for performance and programmability Proceedings of the 45th Annual International Symposium on Computer Architecture, (466-478)
  33. ACM
    Hunger C, Vilanova L, Papamanthou C, Etsion Y and Tiwari M DATS - Data Containers for Web Applications Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, (722-736)
  34. ACM
    Tsai S and Zhang Y LITE Kernel RDMA Support for Datacenter Applications Proceedings of the 26th Symposium on Operating Systems Principles, (306-324)
  35. ACM
    Wang T, Sambasivam S, Solihin Y and Tuck J Hardware supported persistent object address translation Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture, (800-812)
  36. Li Q, Lee P, Zhang P, Su P, He L, Ren K, Qi Li , Lee P, Peng Zhang , Purui Su , Liang He and Kui Ren (2017). Capability-Based Security Enforcement in Named Data Networking, IEEE/ACM Transactions on Networking, 25:5, (2719-2730), Online publication date: 1-Oct-2017.
  37. ACM
    Alam H, Zhang T, Erez M and Etsion Y (2017). Do-It-Yourself Virtual Memory Translation, ACM SIGARCH Computer Architecture News, 45:2, (457-468), Online publication date: 14-Sep-2017.
  38. ACM
    Alam H, Zhang T, Erez M and Etsion Y Do-It-Yourself Virtual Memory Translation Proceedings of the 44th Annual International Symposium on Computer Architecture, (457-468)
  39. ACM
    Vilanova L, Jordà M, Navarro N, Etsion Y and Valero M Direct Inter-Process Communication (dIPC) Proceedings of the Twelfth European Conference on Computer Systems, (16-31)
  40. Gottesman Y and Etsion Y NeSC The 49th Annual IEEE/ACM International Symposium on Microarchitecture, (1-12)
  41. ACM
    Olson L, Power J, Hill M and Wood D Border control Proceedings of the 48th International Symposium on Microarchitecture, (470-481)
  42. ACM
    Chlipala A (2015). Ur/Web, ACM SIGPLAN Notices, 50:1, (153-165), Online publication date: 11-May-2015.
  43. ACM
    Porter D, Bond M, Roy I, Mckinley K and Witchel E (2014). Practical Fine-Grained Information Flow Control Using Laminar, ACM Transactions on Programming Languages and Systems, 37:1, (1-51), Online publication date: 20-Jan-2015.
  44. ACM
    Chlipala A Ur/Web Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (153-165)
  45. ACM
    Vilanova L, Ben-Yehuda M, Navarro N, Etsion Y and Valero M (2014). CODOMs, ACM SIGARCH Computer Architecture News, 42:3, (469-480), Online publication date: 16-Oct-2014.
  46. ACM
    Woodruff J, Watson R, Chisnall D, Moore S, Anderson J, Davis B, Laurie B, Neumann P, Norton R and Roe M (2014). The CHERI capability model, ACM SIGARCH Computer Architecture News, 42:3, (457-468), Online publication date: 16-Oct-2014.
  47. Seshadri S, Gahagan M, Bhaskaran S, Bunker T, De A, Jin Y, Liu Y and Swanson S Willow Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation, (67-80)
  48. Vijayakumar H, Ge X, Payer M and Jaeger T JIGSAW Proceedings of the 23rd USENIX conference on Security Symposium, (973-988)
  49. ACM
    Vijayakumar H, Ge X and Jaeger T Policy models to protect resource retrieval Proceedings of the 19th ACM symposium on Access control models and technologies, (211-222)
  50. Vilanova L, Ben-Yehuda M, Navarro N, Etsion Y and Valero M CODOMs Proceeding of the 41st annual international symposium on Computer architecuture, (469-480)
  51. Woodruff J, Watson R, Chisnall D, Moore S, Anderson J, Davis B, Laurie B, Neumann P, Norton R and Roe M The CHERI capability model Proceeding of the 41st annual international symposium on Computer architecuture, (457-468)
  52. ACM
    Jain B, Tsai C, John J and Porter D Practical techniques to obviate setuid-to-root binaries Proceedings of the Ninth European Conference on Computer Systems, (1-14)
  53. Wu Y, Sun J, Liu Y and Dong J Automatically partition software into least privilege components using dynamic data dependency analysis Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (323-333)
  54. ACM
    Kwon A, Dhawan U, Smith J, Knight T and DeHon A Low-fat pointers Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (721-732)
  55. ACM
    Braun B, Feldman A, Ren Z, Setty S, Blumberg A and Walfish M Verifying computations with state Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, (341-357)
  56. ACM
    Kaminsky M and Dahlin M (2013). Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, 10.1145/2517349, Online publication date: 3-Nov-2013.
  57. ACM
    Vijayakumar H, Schiffman J and Jaeger T Process firewalls Proceedings of the 8th ACM European Conference on Computer Systems, (57-70)
  58. Mycroft A and Voigt J Notions of aliasing and ownership Aliasing in Object-Oriented Programming, (59-83)
  59. ACM
    Chandra S and Back M Faunus Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference, (1-6)
  60. ACM
    King-Lacroix J and Martin A BottleCap Proceedings of the seventh ACM workshop on Scalable trusted computing, (45-54)
  61. ACM
    Roesner F, Fogarty J and Kohno T User interface toolkit mechanisms for securing interface elements Proceedings of the 25th annual ACM symposium on User interface software and technology, (239-250)
  62. ACM
    Crandall J and Oliveira D Holographic vulnerability studies Proceedings of the 2012 New Security Paradigms Workshop, (141-152)
  63. Lyle J, Paverd A, King-Lacroix J, Atzeni A, Virji H, Flechais I and Faily S Personal PKI for the Smart Device Era Revised Selected Papers of the 9th European Workshop on Public Key Infrastructures, Services and Applications - Volume 7868, (69-84)
  64. Dixon C, Mahajan R, Agarwal S, Brush A, Lee B, Saroiu S and Bahl P An operating system for the home Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, (25-25)
  65. ACM
    Saghafi S, Fisler K and Krishnamurthi S Features and object capabilities Proceedings of the 11th annual international conference on Aspect-oriented Software Development, (25-34)
  66. Rotondi D and Piccione S Managing access control for things Proceedings of the 7th International Conference on Body Area Networks, (263-268)
  67. ACM
    DeHon A, Karel B, Knight T, Malecha G, Montagu B, Morisset R, Morrisett G, Pierce B, Pollack R, Ray S, Shivers O, Smith J and Sullivan G Preliminary design of the SAFE platform Proceedings of the 6th Workshop on Programming Languages and Operating Systems, (1-5)
  68. ACM
    Birgisson A, Russo A and Sabelfeld A Capabilities for information flow Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, (1-15)
  69. Tsai W, Li W, Sarjoughian H and Shao Q SimSaaS Proceedings of the 44th Annual Simulation Symposium, (77-86)
  70. ACM
    Felt A, Finifter M, Weinberger J and Wagner D Diesel Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, (416-422)
  71. Denning P Virtual fault tolerance Dependable and Historic Computing, (251-260)
  72. ACM
    Li Z and Wang X FIRM Proceedings of the 26th Annual Computer Security Applications Conference, (181-190)
  73. ACM
    Dixon C, Mahajan R, Agarwal S, Brush A, Lee B, Saroiu S and Bahl V The home needs an operating system (and an app store) Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, (1-6)
  74. ACM
    Cappos J, Dadgar A, Rasley J, Samuel J, Beschastnikh I, Barsan C, Krishnamurthy A and Anderson T Retaining sandbox containment despite bugs in privileged memory-safe code Proceedings of the 17th ACM conference on Computer and communications security, (212-223)
  75. ACM
    Shriraman A and Dwarkadas S (2010). Sentry, ACM SIGARCH Computer Architecture News, 38:3, (407-418), Online publication date: 19-Jun-2010.
  76. ACM
    Shriraman A and Dwarkadas S Sentry Proceedings of the 37th annual international symposium on Computer architecture, (407-418)
  77. ACM
    Hasebe K, Mabuchi M and Matsushita A Capability-based delegation model in RBAC Proceedings of the 15th ACM symposium on Access control models and technologies, (109-118)
  78. ACM
    Krishnamurthy A, Mettler A and Wagner D Fine-grained privilege separation for web applications Proceedings of the 19th international conference on World wide web, (551-560)
  79. ACM
    Mabuchi M, Shinjo Y, Hasebe K, Sato A and Kato K CapaCon Proceedings of the 2010 ACM Symposium on Applied Computing, (706-712)
  80. Cai L, Machiraju S and Chen H Capauth Proceedings of the 29th conference on Information communications, (386-390)
  81. ACM
    Tiwari M, Li X, Wassel H, Chong F and Sherwood T Execution leases Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, (493-504)
  82. ACM
    Tootoonchian A, Saroiu S, Ganjali Y and Wolman A Lockr Proceedings of the 5th international conference on Emerging networking experiments and technologies, (169-180)
  83. Rahhal C, Skaf-Molli H, Molli P and Weiss S Multi-synchronous Collaborative Semantic Wikis Proceedings of the 10th International Conference on Web Information Systems Engineering, (115-129)
  84. Ignat C, Oster G and Molli P DooSo6 Proceedings of the 6th international conference on Cooperative design, visualization, and engineering, (56-63)
  85. ACM
    Shirley J and Evans D The user is not the enemy Proceedings of the 2008 New Security Paradigms Workshop, (33-45)
  86. Geambasu R, Gribble S and Levy H CloudViews Proceedings of the 2009 conference on Hot topics in cloud computing
  87. ACM
    Roy I, Porter D, Bond M, McKinley K and Witchel E Laminar Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, (63-74)
  88. ACM
    Roy I, Porter D, Bond M, McKinley K and Witchel E (2009). Laminar, ACM SIGPLAN Notices, 44:6, (63-74), Online publication date: 28-May-2009.
  89. Zeldovich N, Kannan H, Dalton M and Kozyrakis C Hardware enforcement of application security policies using tagged memory Proceedings of the 8th USENIX conference on Operating systems design and implementation, (225-240)
  90. ACM
    Miltchev S, Smith J, Prevelakis V, Keromytis A and Ioannidis S (2008). Decentralized access control in distributed file systems, ACM Computing Surveys, 40:3, (1-30), Online publication date: 1-Aug-2008.
  91. ACM
    Geambasu R, Cheung C, Moshchuk A, Gribble S and Levy H Organizing and sharing distributed personal web-service data Proceedings of the 17th international conference on World Wide Web, (755-764)
  92. ACM
    Álvarez Gutiérrez D and Soler F Applying lightweight flexible virtual machines to extensible embedded systems Proceedings of the 1st workshop on Isolation and integration in embedded systems, (23-28)
  93. ACM
    Leung A, Miller E and Jones S Scalable security for petascale parallel file systems Proceedings of the 2007 ACM/IEEE conference on Supercomputing, (1-12)
  94. ACM
    Geambasu R, Balazinska M, Gribble S and Levy H Homeviews Proceedings of the 2007 ACM SIGMOD international conference on Management of data, (235-246)
  95. ACM
    Black A, Hutchinson N, Jul E and Levy H The development of the Emerald programming language Proceedings of the third ACM SIGPLAN conference on History of programming languages, (11-1-11-51)
  96. ACM
    Irvine C and Levitt K Trusted hardware Proceedings of the 44th annual Design Automation Conference, (1-4)
  97. ACM
    Hunt G and Larus J (2007). Singularity, ACM SIGOPS Operating Systems Review, 41:2, (37-49), Online publication date: 1-Apr-2007.
  98. Sandhu R, Zhang X, Ranganathan K and Covington M (2006). Client-side access control enforcement using trusted computing and PEI models, Journal of High Speed Networks, 15:3, (229-245), Online publication date: 1-Jul-2006.
  99. ACM
    Witchel E, Rhee J and Asanović K Mondrix Proceedings of the twentieth ACM symposium on Operating systems principles, (31-44)
  100. ACM
    Witchel E, Rhee J and Asanović K (2005). Mondrix, ACM SIGOPS Operating Systems Review, 39:5, (31-44), Online publication date: 20-Oct-2005.
  101. Krohn M, Efstathopoulos P, Frey C, Kaashoek F, Kohler E, Mazières D, Morris R, Osborne M, VanDeBogart S and Ziegler D Make least privilege a right (not a privilege) Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10, (21-21)
  102. ACM
    Sandhu R and Zhang X Peer-to-peer access control architecture using trusted computing technology Proceedings of the tenth ACM symposium on Access control models and technologies, (147-158)
  103. Udzir N, Wood A and Jacob J Coordination with multicapabilities Proceedings of the 7th international conference on Coordination Models and Languages, (79-93)
  104. Crandall J and Chong F Minos Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture, (221-232)
  105. Zhou P, Qin F, Liu W, Zhou Y and Torrellas J iWatcher Proceedings of the 31st annual international symposium on Computer architecture
  106. Meyer M (2004). A Novel Processor Architecture with Exact Tag-Free Pointers, IEEE Micro, 24:3, (46-55), Online publication date: 1-May-2004.
  107. ACM
    Zhou P, Qin F, Liu W, Zhou Y and Torrellas J (2004). iWatcher, ACM SIGARCH Computer Architecture News, 32:2, (224), Online publication date: 2-Mar-2004.
  108. ACM
    Swift M, Bershad B and Levy H (2003). Improving the reliability of commodity operating systems, ACM SIGOPS Operating Systems Review, 37:5, (207-222), Online publication date: 1-Dec-2003.
  109. ACM
    Fu Y, Chase J, Chun B, Schwab S and Vahdat A (2003). SHARP, ACM SIGOPS Operating Systems Review, 37:5, (133-148), Online publication date: 1-Dec-2003.
  110. ACM
    Swift M, Bershad B and Levy H Improving the reliability of commodity operating systems Proceedings of the nineteenth ACM symposium on Operating systems principles, (207-222)
  111. ACM
    Fu Y, Chase J, Chun B, Schwab S and Vahdat A SHARP Proceedings of the nineteenth ACM symposium on Operating systems principles, (133-148)
  112. ACM
    Abendroth J and Jensen C Partial outsourcing Proceedings of the eighth ACM symposium on Access control models and technologies, (134-141)
  113. Kallahalla M, Riedel E, Swaminathan R, Wang Q and Fu K Plutus Proceedings of the 2nd USENIX conference on File and storage technologies, (3-3)
  114. ACM
    Abendroth J and Jensen C A unified security framework for networked applications Proceedings of the 2003 ACM symposium on Applied computing, (351-357)
  115. Frailey D Computer architecture Encyclopedia of Computer Science, (304-319)
  116. Gehringer E Capability-based addressing Encyclopedia of Computer Science, (194-196)
  117. ACM
    Witchel E, Cates J and Asanović K (2002). Mondrian memory protection, ACM SIGOPS Operating Systems Review, 36:5, (304-316), Online publication date: 1-Dec-2002.
  118. ACM
    Witchel E, Cates J and Asanović K (2002). Mondrian memory protection, ACM SIGARCH Computer Architecture News, 30:5, (304-316), Online publication date: 1-Dec-2002.
  119. ACM
    Palacz K, Vitek J, Czajkowski G and Daynès L (2002). Incommunicado, ACM SIGPLAN Notices, 37:11, (262-274), Online publication date: 17-Nov-2002.
  120. ACM
    Palacz K, Vitek J, Czajkowski G and Daynès L Incommunicado Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (262-274)
  121. ACM
    Witchel E, Cates J and Asanović K Mondrian memory protection Proceedings of the 10th international conference on Architectural support for programming languages and operating systems, (304-316)
  122. ACM
    Witchel E, Cates J and Asanović K (2002). Mondrian memory protection, ACM SIGPLAN Notices, 37:10, (304-316), Online publication date: 1-Oct-2002.
  123. Lopriore L (2002). Access Control Mechanisms in a Distributed, Persistent Memory System, IEEE Transactions on Parallel and Distributed Systems, 13:10, (1066-1083), Online publication date: 1-Oct-2002.
  124. Shapiro J and Hardy N (2002). EROS, IEEE Software, 19:1, (26-33), Online publication date: 1-Jan-2002.
  125. Chander A, Mitchell J and Dean D A State-Transition Model of Trust Management and Access Control Proceedings of the 14th IEEE workshop on Computer Security Foundations
  126. ACM
    Shapiro J, Smith J and Farber D (1999). EROS, ACM SIGOPS Operating Systems Review, 33:5, (170-185), Online publication date: 12-Dec-1999.
  127. ACM
    Shapiro J, Smith J and Farber D EROS Proceedings of the seventeenth ACM symposium on Operating systems principles, (170-185)
  128. ACM
    Vitek J and Bokowski B (1999). Confined types, ACM SIGPLAN Notices, 34:10, (82-96), Online publication date: 1-Oct-1999.
  129. ACM
    Vitek J and Bokowski B Confined types Proceedings of the 14th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (82-96)
  130. Hawblitzel C, Chang C, Czajkowski G, Hu D and von Eicken T Implementing multiple protection domains in java Proceedings of the annual conference on USENIX Annual Technical Conference, (22-22)
  131. ACM
    Riechmann T and Hauck F Meta objects for access control Proceedings of the 1998 workshop on New security paradigms, (30-38)
  132. ACM
    Riechmann T and Hauck F Meta objects for access control Proceedings of the 1997 workshop on New security paradigms, (17-22)
  133. ACM
    Wallach D, Balfanz D, Dean D and Felten E (1997). Extensible security architectures for Java, ACM SIGOPS Operating Systems Review, 31:5, (116-128), Online publication date: 1-Dec-1997.
  134. ACM
    Wallach D, Balfanz D, Dean D and Felten E Extensible security architectures for Java Proceedings of the sixteenth ACM symposium on Operating systems principles, (116-128)
  135. ACM
    Hagimont D and Ismail L A protection scheme for mobile agents on Java Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, (215-222)
  136. Rousseau L and Natkin S A Framework of Secure Object System Architecture Proceedings of the 3rd Workshop on Object-Oriented Real-Time Dependable Systems - (WORDS '97)
  137. ACM
    Hagimont D, Mossière J and Hemming C Hidden capabilities Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, (219-223)
  138. Berman A, Bourassa V and Selberg E TRON Proceedings of the USENIX 1995 Technical Conference Proceedings, (14-14)
  139. ACM
    Carter N, Keckler S and Dally W (1994). Hardware support for fast capability-based addressing, ACM SIGOPS Operating Systems Review, 28:5, (319-327), Online publication date: 1-Dec-1994.
  140. ACM
    Carter N, Keckler S and Dally W Hardware support for fast capability-based addressing Proceedings of the sixth international conference on Architectural support for programming languages and operating systems, (319-327)
  141. ACM
    Carter N, Keckler S and Dally W (1994). Hardware support for fast capability-based addressing, ACM SIGPLAN Notices, 29:11, (319-327), Online publication date: 1-Nov-1994.
  142. ACM
    Scholerman S, Miller L, Tenner J, Tomanek S and Zolliker M (1993). Relational database integration in the IBM AS/400, ACM SIGMOD Record, 22:4, (5-10), Online publication date: 1-Dec-1993.
  143. Frantz W and Landau C Object oriented transaction processing in the KeyKOS microkernel USENIX Symposium on USENIX Microkernels and Other Kernel Architectures Symposium - Volume 4, (2-2)
  144. ACM
    Booch G (1992). The end of objects and the last programmer (Invited talk), ACM SIGPLAN OOPS Messenger, 4:2, (3-8), Online publication date: 1-Apr-1993.
  145. ACM
    Booch G The end of objects and the last programmer (Invited talk) Addendum to the proceedings on Object-oriented programming systems, languages, and applications (Addendum), (3-8)
  146. ACM
    Chase J, Levy H, Lazowska E and Baker-Harvey M (1992). Lightweight shared objects in a 64-bit operating system, ACM SIGPLAN Notices, 27:10, (397-413), Online publication date: 31-Oct-1992.
  147. ACM
    Chase J, Levy H, Lazowska E and Baker-Harvey M Lightweight shared objects in a 64-bit operating system Conference proceedings on Object-oriented programming systems, languages, and applications, (397-413)
  148. Auerbach J, Bacon D, Goldberg A, Goldszmidt G, Kennedy M, Lowry A, Russell J, Silverman W, Strom R, Yellin D and Yemini S High-level language support for programming distributed systems Proceedings of the 1991 conference of the Centre for Advanced Studies on Collaborative research, (173-196)
  149. ACM
    Bergin J (1990). Coatroom: an ADT which is useful in implementation of object oriented programming, ACM SIGCSE Bulletin, 22:3, (45-ff.), Online publication date: 1-Aug-1990.
  150. Lazzerini B and Lopriore L (1989). Abstraction Mechanisms for Event Control in Program Debugging, IEEE Transactions on Software Engineering, 15:7, (890-901), Online publication date: 1-Jul-1989.
  151. ACM
    Bjornerstedt A and Britts S (1988). AVANCE: an object management system, ACM SIGPLAN Notices, 23:11, (206-221), Online publication date: 1-Nov-1988.
  152. ACM
    Bjornerstedt A and Britts S AVANCE: an object management system Conference proceedings on Object-oriented programming systems, languages and applications, (206-221)
  153. ACM
    Cheriton D and Wolf M Extensions for multi-module records in conventional programming languages Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, (296-306)
  154. ACM
    Jacobson I (1986). Language support for changeable large real time systems, ACM SIGPLAN Notices, 21:11, (377-384), Online publication date: 1-Nov-1986.
  155. ACM
    Jacobson I Language support for changeable large real time systems Conference proceedings on Object-oriented programming systems, languages and applications, (377-384)
  156. ACM
    Hardy N (1985). KeyKOS architecture, ACM SIGOPS Operating Systems Review, 19:4, (8-25), Online publication date: 1-Oct-1985.
  157. ACM
    Johnson H, Koegel J and Koegel R A secure distributed capability based system (extended abstract) Proceedings of the 1985 ACM annual conference on The range of computing : mid-80's perspective: mid-80's perspective, (392-402)
  158. ACM
    Waguespack L A structural computer system resource model for teaching computer organization Proceedings of the sixteenth SIGCSE technical symposium on Computer science education, (63-67)
  159. ACM
    Waguespack L (1985). A structural computer system resource model for teaching computer organization, ACM SIGCSE Bulletin, 17:1, (63-67), Online publication date: 1-Mar-1985.
  160. Lopriore L (1984). Capability Based Tagged Architectures, IEEE Transactions on Computers, 33:9, (786-803), Online publication date: 1-Sep-1984.
Contributors
  • University of Washington
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations