The Confused Deputy (or why capabilities might have been invented) (1994)

View PDF

Download Links

by Norman Hardy
Venue:ACM SIGOPS Operating Systems Review
Citations:92 - 0 self

Documents Related by Co-Citation

682 The Protection of Information in Computer Systems – Jerome H. Saltzer, Michael D. Schroeder - 1975
2669 The strength of weak ties – M S Granovetter - 1973
585 A Lattice Model of Secure Information Flow – Dorothy E. Denning - 1976
610 Secure Computer Systems: Unified Exposition and Multics Interpretation – D Bell, L LaPadula - 1976
544 Data Security – Dorothy E. Denning, Peter J. Denning - 1979
860 Scale and performance in a distributed file system – John H. Howard, Michael L. Kazar, Sherri G. Menees, A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, Michael J. West - 1988
486 JFlow: Practical Mostly-Static Information Flow Control – Andrew C. Myers - 1999
418 Certification of programs for secure information flow – D E DENNING, P J DENNING - 1977
1114 The strategy of Conflict – T C Schelling - 1960