|
Publications by date
-
-
-
-
-
-
Naming and Protection in Extendible Operating Systems by David D Redell.
Ph.D. thesis, Massachusetts Institute of Technology, 1974. (BibTeX entry)·
HYDRA: the kernel of a multiprocessor operating system (DOI) by W. Wulf, E. Cohen, W. Corwin, Anita Jones, R. Levin, C. Pierson, and F. Pollack.
In Communications of the ACM 17(6), 1974, pages 337-345. (BibTeX entry)·
Towards the Design of Secure Systems by Anita Katherine Jones and William A. Wulf.
In the Proceedings of the International Workshop on Protection in Operating Systems, Rocquencourt, Le Chesnay, France, August 1974, pages 121-135. (BibTeX entry)·
-
The protection of information in computer systems (DOI) by J.H. Saltzer and M.D. Schroeder.
In Proceedings of the IEEE 63(9), 1975, pages 1278-1308. (BibTeX entry)·
Protection of the Hydra Operating System by E. Cohen and D. Jefferson.
In the Proceedings of the Fifth ACM Symposium on Operating Systems Principles, 1975, pages 141-160. (BibTeX entry)·
Towards the design of secure systems (DOI) by Anita K. Jones and William A. Wulf.
In Software: Practice and Experience 5(4), 1975. (BibTeX entry)·
A Provably Secure Operating System by P.G. Neumann, L. Robinson, K.N. Levitt, R.S. Boyer, and A.R. Saxena.
Computer Science Laboratory SRI International, Menlo Park, California technical report , June 1975. (BibTeX entry)·
-
-
A Provably Secure Operating System: The System, Its Applications, and Proofs by P.G. Neumann, R.S. Boyer, R.J. Feiertag, K.N. Levitt, and L. Robinson.
Computer Science Laboratory SRI International, Menlo Park, California technical report , February 1977. (BibTeX entry)·
The Narrowing Gap Between Language Systems and Operating Systems by Anita K. Jones.
In the Proceedings of the 7th Information Processing IFIP Congress, Toronto, Canada, August 1977, pages 869-873. (BibTeX entry)·
-
-
The Cambridge CAP Computer and Its Operating System (PDF) (Cached: PDF) by Maurice Vincent Wilkes, Roger Michael Needham, and Peter J. Denning.
Elsevier North Holland 1979,Operating and Programming Systems Series. (BibTeX entry)·
StarOS, a Multiprocessor Operating System for the Support of Task Forces (DOI) by Anita K. Jones, Robert J. Chansler, Ivor Durham, Karsten Schwans, and Steven R. Vegdahl.
In the Proceedings of the Seventh ACM Symposium on Operating Systems Principles, Pacific Grove, California, USA, 1979. (BibTeX entry)·
The Foundations of a Provably Secure Operating System (PSOS) (PDF) (Cached: PDF) by R. J. Feiertag and P. G. Neumann.
In the Proceedings of the National Computer Conference, 1979, pages 329-334. (BibTeX entry)·
-
A Provably Secure Operating System: The System, Its Applications, and Proofs by P. G. Neumann, R.S. Boyer, R.J. Feiertag, K.N. Levitt, and L. Robinson.
Computer Science Laboratory, SRI International, Menlo Park, California technical report , May 1980. (BibTeX entry)·
Capability Architecture Revisited (DOI) by Anita K. Jones.
In SIGOPS Operating Systems Review 14(3), July 1980. (BibTeX entry)·
-
-
-
-
-
Discussion: The Burroughs B 5000 in Retrospect (DOI) by R. S. Barton, H. Berce, G. A. Collins, B. A. Creech, D. M. Dahm, B. A. Dent, V. J. Ford, B. A. Galler, J. E. S. Hale, E. A. Hauck, J. T. Hootman, P. D. King, N. L. Kreuder, W. R. Lonergan, D. MacDonald, F. B. MacKenzie, C. Oliphint, R. Pearson, R. F. Rosin, L. D. Turner, and R. Waychoff.
In Annals of the History of Computing 9(1), January 1987, pages 37-92. (BibTeX entry)·
-
-
-
EROS: A Fast Capability System (DOI) by Jonathan S. Shapiro, Jonathan M. Smith, and David J. Farber.
In the Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles, New York, NY, USA, 1999, pages 170-185. (BibTeX entry)·
-
-
-
-
-
Class properties for security review in an object-capability subset of Java (DOI) by Adrian Mettler and David Wagner.
In the Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security '10, Toronto, Canada, 2010, pages 1-7. (BibTeX entry)·
Capsicum: Practical capabilities for Unix by Robert N.~M. Watson, J. Anderson, B. Laurie, and K. Kennaway.
In the Proceedings of the 19th USENIX Security Symposium, August 2010. (BibTeX entry)·
Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems (PDF) (Cached: PDF) by Peter G. Neumann and Robert N. M. Watson.
In the Proceedings of the Fourth Layered Assurance Workshop, Austin, Texas, December 2010. (BibTeX entry)·
-
-
Beyond the PDP-11: Architectural support for a memory-safe C abstract machine (PDF) (Cached: PDF) by David Chisnall, Colin Rothwell, Brooks Davis, Robert Watson, Jonathan Woodruff, Simon Moore, Peter G. Neumann, and Michael Roe.
In the Proceedings of the Fifteenth Edition of ASPLOS on Architectural Support for Programming Languages and Operating Systems, Istanbul, Turkey, 2014. (BibTeX entry)·
-
-
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) (PDF) (Cached: PDF) by Robert N. M. Watson, Peter G. Neumann, Jonathan Woodruff, Michael Roe, Jonathan Anderson, David Chisnall, Brooks Davis, Alexandre Joannou, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Robert Norton, Stacey Son, and Hongyan Xia.
University of Cambridge, Computer Laboratory technical report UCAM-CL-TR-891, June 2016. (BibTeX entry)·
-
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) (PDF) (Cached: PDF) by Robert N. M. Watson, Peter G. Neumann, Jonathan Woodruff, Michael Roe, Jonathan Anderson, John Baldwin, David Chisnall, Brooks Davis, Alexandre Joannou, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Robert Norton, Stacey Son, and Hongyan Xia.
University of Cambridge, Computer Laboratory technical report UCAM-CL-TR-907, April 2017. (BibTeX entry)·
-
Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA) (PDF) (Cached: PDF) by Robert N. M. Watson, Peter G Neumann, and Simon W. Moore.
In the New Solutions for Cybersecurity, 2018. (BibTeX entry)·
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 7) (PDF) (Cached: PDF) by Robert N. M. Watson, Peter G. Neumann, Jonathan Woodruff, Michael Roe, Hesham Almatary, Jonathan Anderson, John Baldwin, David Chisnall, Brooks Davis, Nathaniel Wesley Filardo, Alexandre Joannou, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Kyndylan Nienhuis, Robert Norton, Alex Richardson, Peter Rugg, Peter Sewell, Stacey Son, and Hongyan Xia.
University of Cambridge, Computer Laboratory technical report UCAM-CL-TR-927, October 2018. (BibTeX entry)·
-
CHERI Concentrate: Practical Compressed Capabilities (DOI) by Jonathan Woodruff, Alexandre Joannou, Hongyan Xia, Anthony Fox, Robert Norton, Thomas Bauereiss, David Chisnall, Brooks Davis, Khilan Gudka, Nathaniel W. Filardo, A. Theodore Markettos, Michael Roe, Peter G. Neumann, Robert N. M. Watson, and Simon W. Moore.
In IEEE Transactions on Computers, 2019. (BibTeX entry)·
StkTokens: Enforcing Well-bracketed Control Flow and Stack Encapsulation using Linear Capabilities by Lau Skorstengaard, Dominique Devriese, and Lars Birkedal.
In Proc. ACM Programming Languages 3(POPL), January 2019. (BibTeX entry)·
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (PDF) (Cached: PDF) by Brooks Davis, Robert N. M. Watson, Alexander Richardson, Peter Neumann, Simon Moore, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel Wesley Filardo, Khilan Gudka, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, Ed Maste, Alfredo Mazzinghi, Edward Tomasz Napierala, Robert Norton, Michael Roe, Peter Sewell, Stacey Son, and Jonathan Woodruff.
In the Proceedings of the 24nd ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2019), April 2019. (BibTeX entry)·
SemperOS: A Distributed Capability System (PDF) (Cached: PDF) by Matthias Hille, Nils Asmussen, Pramod Bhatotia, and Hermann Härtig.
In the Proceedings of 2019 USENIX Annual Technical Conference (USENIX ATC 19), Renton, WA, July 2019, pages 709-722. (BibTeX entry)·
|
|