SLIDE 8 Thank you! Thank you!
Questions? Email: hopezhao@cs.york.ac.uk
15
References References
- [Boebert84] W. E. Boebert, “On the Inability of an Unmodified Capability Machine to Enforce
the *-property”, In Proc, 7th DoD/NBS Computer Security Conference, pages 291--293, Gaithersburg MD USA, September 1984, National Bureau of Standards. http://www.erights.org/elib/capability/duals/boebert.html (Read in Dec 2009)
- [Boebert03] Earl Boebert. Comments on Capability Myths Demolished, 2003.
http://www.eros-os.org/pipermail/cap-talk/2003-March/001133.html (Read in Nov 2009)
- [CP08] Arthur Charguéraud, Françios Pottier, “Functional Translation of a Calculus of
Capabilities”, SIGPLAN Notices, 43(9):213--224, 2008
- [DVH66] Jack B. Dennis, Earl C. Van Horn, “Programming Semantics for Multiprogrammed
Computations”, Communications of the ACM, 9(3):143-155, March 1966.
- [Gong89] Li Gong, “A Secure Identity-Based Capability System”, Proceedings of 1989 IEEE
Symposium on Security and Privacy, pages 56—63, 1989
- [Gorla09] Daniele Gorla, Rosario Pugliese, “Dynamic management of capabilities in a network
aware coordination language”, Journal of Logic and Algebraic Programming, 78(8):665—689, 2009.
- [Kain87] Richard Y. Kain, Carl E. Landwehr, “On Access Checking in Capability-Based
Systems”, IEEE Transactions on Software Engineering, SE13(2), February 1987.
- [KGBG03] A.H. Karp, G.J. Rozas, A. Banerj, R. Guptai, “Using Split Capabilities for Access
Control”, IEEE Software, 20(1):42—49, January 2003.
- [Levy84] Henry M Levy, “Capability-Based Computer Systems”, Digital Press, 1984.
http://www.cs.washington.edu/homes/levy/capabook/ (Read in Oct 2009) 16