|
Publications by topic
-
-
Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 7) (PDF) (Cached: PDF) by Robert N. M. Watson, Peter G. Neumann, Jonathan Woodruff, Michael Roe, Hesham Almatary, Jonathan Anderson, John Baldwin, David Chisnall, Brooks Davis, Nathaniel Wesley Filardo, Alexandre Joannou, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Kyndylan Nienhuis, Robert Norton, Alex Richardson, Peter Rugg, Peter Sewell, Stacey Son, and Hongyan Xia.
University of Cambridge, Computer Laboratory technical report UCAM-CL-TR-927, October 2018. (BibTeX entry)·
-
-
-
-
-
Protection in Programmed Systems by Anita Katherine Jones.
PhD, Carnegie Mellon University, June 1973. (BibTeX entry)·
Naming and Protection in Extendible Operating Systems by David D Redell.
Ph.D. thesis, Massachusetts Institute of Technology, 1974. (BibTeX entry)·
The Confused Deputy (or why capabilities might have been invented) by Norman Hardy.
In ACM SIGOPS Operating Systems Review 22(4), October 1988. (BibTeX entry)·
Capability Myths Demolished (PDF) (Cached: PDF) by Mark S Miller, Ka-Ping Yee, and Jonathan Shapiro.
Johns Hopkins University technical report , 2003. (BibTeX entry)·
Paradigm Regained: Abstraction Mechanisms for Access Control (website, PDF) (Cached: PDF) by Mark S. Miller and Jonathan S. Shapiro.
In the Proceedings of Advances in Computing Science – ASIAN 2003, Berlin, Heidelberg, 2003, pages 224-242. (BibTeX entry)·
|
|