Capability-based Financial Instruments (2000)


Download Links

by Mark S. Miller , Chip Morningstar , Bill Frantz
Venue:In Proc. Financial Cryptography 2000, Anguila, BWI
Citations:38 - 6 self

Active Bibliography

29 Paradigm Regained: Abstraction Mechanisms for Access Control – Mark S. Miller, Hewlett Packard Laboratories, Jonathan S. Shapiro - 2001
82 Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control – Mark Samuel Miller - 2006
2 Non-delegatable authorities in capability systems – Toby Murray, Duncan Grove - 2008
1 Delegating Responsibility in Digital Systems: Horton’s “Who Done It?” – Mark S. Miller, James E. Donnelley
3 Discretionary capability confinement – Philip W. L. Fong, Philip W. L. Fong - 2006
9 Capabilities as alias control: Secure cooperation in dynamically extensible systems – Philip W. L. Fong, Cheng Zhang - 2004
24 Capability Myths Demolished – Mark Miller, Ka-Ping Yee, Jonathan Shapiro, Combex Inc - 2003
The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls – Z. Cliffe Schreuders, Tanya Mcgill, Christian Payne, Z. Cliffe Schreuders A, Tanya Mcgill B, Christian Payne B - 2012
186 Extensible security architecture for Java – Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten - 1997
13 Pluggable Verification Modules: An Extensible Protection Mechanism for the JVM – Philip W.L. Fong - 2003
Using Sparse Capabilities in a Distributed Operating System – Andrew Tanenbaum Dept, Andrew S. Tanenbaum, Sape J. Mullender, Robbert Van Renesse - 1986
1 Secure Abstraction with Code Capabilities – Robbert Van Renesse, H˚avard D. Johansen, Nihar Naigaonkar, Dag Johansen
87 Using Sparse Capabilities in a Distributed Operating System – Andrew S. Tanenbaum, Sape J. Mullender, Robbert van Renesse - 1986
10 Design Evolution of the EROS Single-Level Store – Jonathan S. Shapiro, Jonathan Adams - 2002
11 Verifying Operating System Security – J. S. Shapiro, S. Weber - 1997
Abstract – Tyler Close, Tyler Close - 2006
37 Security for network attached storage devices – Howard Gobioff, Garth Gibson, Doug Tygar - 1997
1 Discretionary object confinement: A minimalistapproach to capabilities for the JVM – Boting Yang, Boting Yang, Philip W. L. Fong, Philip W. L. Fong, Boting Yangdepartment, Computer Science - 2004
2 Link-Time Enforcement of Confined Types for JVM Bytecode – Philip W. L. Fong - 2005