The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
A new capability will then be derived in the usual fashion. Before passing the new capability back to the user, the second half of the password is encrypted with the evaluated key. ... ., FROSINI, G. and LOPRIORE, L. (1984): The Implementa- tion of Abstract Objects in a Capability Based Architecture, The Comput. J, Vol. 27, 2, pp. 127-134. ...
News Vol 4 Pt 4 (1976) pp 141-146 Mohamad, SM A A guideline to the problem of designing well-protected computer systems MCSG/TR19, Brunel University, UK (1982) McLaren, F W and MacEwan, G H ‘Computer security ... European Computing Congress Brunel University, UK (13-17 May 1974) Dennis, T D A capability architecture PhD Dis., Purdue University, USA (1980) Theorey, T J ‘Validation criteria for computer system simulations ...
Proceedings of the ACM symposium on Operating System Principles - SOSP '67
A Technique for the Architectural Implementa- tion of Software Subsystems. In Proceedings of the 7th Symposium on Computer Architecture, pages 236-244. May 1980. [Jensen 751 K. Jensen and N. ... The Cm* Multiprocessor Project: A Research Review. Technical Report, Department of Computer Science, Carnegie-Mellon University, July 1980. [Jones 80b] A. K. Jones. Capability Architecture Revisited. ...doi:10.1145/800001.811666 fatcat:klpvy7r2tbh35a6u7lom4tf6yi
Acknowledgement Many individuals involved in the projects described here spent time patiently explaining their activities to me, putting together written descriptions for me to work from, and reviewing ... Thanks are due all of them, but responsibility for mistakes and omissions is my own. ... new computer system based on a mildly restricted implementation of the "capability" view of protection. ...doi:10.1145/775275.775278 fatcat:c5o7efmfwfczln4art3y5q2n4a
Even so, current times are defined by innovation and quantum computers future usage seems to define a totally new era of security. ... layer to increase protection for the modern software architectural style represented by microservices and which has become the favourite development alternative of the last years. ... This problem has a high level of difficulty even for quantum computing and this is the reason why NTRU cryptosystem becomes a subject of interest for industry as an alternative to define the new era of ...doi:10.18421/sar51-02 doaj:ff3faf066e874684bb75eadc98bc0d70 fatcat:yr4luvpwijfebnwr5w6q23wp5y
The SWARD architecture, an experimental higher-level architecture, contains the naming and protection concept of capability-based addressing. ... The initial representation of capability-based addressing in the architecture led to a set of problems; these problems are described, as well as their solutions. ... I ntrod uction The concept of viewing a computing system as a set of objects, and addressing the objects by a protected name known as a capability, has existed for 14 years [I] but has been slow in influencing ...doi:10.1145/641914.641916 fatcat:ntx4j2jepffszavqkcy5i3cmd4
The SWARD architecture, an experimental higher-level architecture, contains the naming and protection concept of capability-based addressing. ... The initial representation of capability-based addressing in the architecture led to a set of problems; these problems are described, as well as their solutions. ... I ntrod uction The concept of viewing a computing system as a set of objects, and addressing the objects by a protected name known as a capability, has existed for 14 years [I] but has been slow in influencing ...doi:10.1145/850708.850709 fatcat:nqvneiqtibfz7gyqdsm7v5pxxm
Computer's October 1980 and 1996 PDFs of the articles and departments from the award for his recent work in capability-based architecture resulting in the CAP computer at Cambridge University. ... Now, as we move to the integrated circuit, a new realm is again open with VLSI. Capability architectures and language-oriented architectures are only a beginning." ...doi:10.1109/mc.2012.330 fatcat:vayxhv4ovffqjkmcc7cw7mrkxi
T HE emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources. ... / framework/architecture, new cryptography for cloud solutions, and cloud-oriented privacy protection and secure networks dimensions. ... T HE emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources. ...doi:10.1109/tcc.2018.2790678 fatcat:hafi2gcq55aencxyxlfm4hboa4
Frenchgage oflth smoi che by for outstanding technical contributions; ogies); and the DJS-60 series after the Jacquaes Lefanth smofiumtheansitutde tocmuebrhtetr.Atog Mo'torola 6800. ... , Zhiliang ex-Aleatoires. the ." ... Capability architectures and for a dual processor, the: HDS-9 can Michigan with the aid of one subcommitlanguage-oriented architectures are only compete with current American and tee for the US and Canada ...doi:10.1109/mc.1980.1653383 fatcat:ht42s5oj6jbf5bgxugmxvy7ngq
He is currently a Professor in cyber-physical systems for engineering and production with the Johannes Kepler University, Linz, Austria. ... He is also a part time Professor with the Research Institute Fortiss, Munich, Germany, where he was leading the competence field Industrie 4.0. ... To overcome this issue, they introduce a new architecture for automation systems, the data privacypreserving automation architecture, which allows the transformation of plain application data to privacy-secure ...doi:10.1109/tii.2018.2834862 fatcat:kclxtn5uabdmjkjrkbdcwzg5xy
G l o b a l I S computing environments. (For more on the EPSRC, see www. epsrc.ac.uk.) ... In the next decade, Cambridge is projected to have 50,000 new jobs, 42,000 new homes, a 36 percent increase in car trips, and a 57 percent increase in public-transportation volume (see www.cambridgemit.org ...doi:10.1109/mis.2005.116 fatcat:2unx6yegpfcr5lss6mma3uct6m
The authors detail the software and techniques hackers use and provide a hands-on approach to learning the vital security skills needed to protect network systems. ... Send press releases and new books to Computer, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; fax +1 714 821 4010; email@example.com. ... This book presents new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms that developers can use to rapidly and effortlessly generate system-on-chip cores that ...doi:10.1109/mc.2004.45 fatcat:6nsa45736jdpfnwvtkfularm2m
This paper gives an outline of the architecture of the CAP computer as it concerns capability-based protection and then gives an account of how protected procedures are used in the construction of an operating ... Acknowledgements The CAP project is supported by tile Science Research Council. We ... a new capability for the directory which may only be used for, for example, retrieve operations. ...doi:10.1145/800214.806541 dblp:conf/sosp/NeedhamW77 fatcat:h6hv3axnlnbppov2xdjmdbtijq
This idea was readily exploited capability-based operating systems such as the Cambridge CAP Computer which added to its hardware supported capabilities for memory segments abstract "software capabilities ... software and users to rewrite their applications to the new architecture. ...doi:10.1145/2830903.2830909 dblp:conf/sosp/Herbert15 fatcat:mposov6rcjchvbagkz7476zppu
« Previous Showing results 1 — 15 out of 16,769 results