The Confused Deputy (or why capabilities might have been invented) (1994)

Cached

Download Links

by Norman Hardy
Venue:ACM SIGOPS Operating Systems Review
Citations:69 - 0 self

Documents Related by Co-Citation

642 The Protection of Information in Computer Systems – Jerome H. Saltzer, Michael D. Schroeder - 1975
1964 The strength of weak ties – M S Granovetter - 1973
565 A Lattice Model of Secure Information Flow – Dorothy E. Denning - 1976
576 Secure Computer Systems: Unified Exposition and Multics Interpretation – D E Bell, L J LaPadula - 1976
828 Scale and performance in a distributed file system – John H. Howard, Michael L. Kazar, Sherri G. Menees, A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, Michael J. West - 1988
506 Cryptography and Data Security – Dorothy E. Denning, Peter, J. Denning - 1982
876 The Strategy of Conflict – T C Schelling - 1960
1234 On the Criteria To Be Used in Decomposing Systems into Modules – D. L. Parnas - 1972
3578 LIBSVM: a Library for Support Vector Machines – Chih-chung Chang, Chih-Jen Lin - 2001