Filters








16,769 Hits in 4.4 sec

Page 132 of Journal of Research and Practice in Information Technology Vol. 20, Issue 3 [page]

1988 Journal of Research and Practice in Information Technology  
A new capability will then be derived in the usual fashion. Before passing the new capability back to the user, the second half of the password is encrypted with the evaluated key.  ...  ., FROSINI, G. and LOPRIORE, L. (1984): The Implementa- tion of Abstract Objects in a Capability Based Architecture, The Comput. J, Vol. 27, 2, pp. 127-134.  ... 

Page 21 of Computer Performance Vol. 5, Issue 1 [page]

1984 Computer Performance  
News Vol 4 Pt 4 (1976) pp 141-146 Mohamad, SM A A guideline to the problem of designing well-protected computer systems MCSG/TR19, Brunel University, UK (1982) McLaren, F W and MacEwan, G H ‘Computer security  ...  European Computing Congress Brunel University, UK (13-17 May 1974) Dennis, T D A capability architecture PhD Dis., Purdue University, USA (1980) Theorey, T J ‘Validation criteria for computer system simulations  ... 

An implementation of a multiprocessing computer system

William B. Ackerman, William W. Plummer
1967 Proceedings of the ACM symposium on Operating System Principles - SOSP '67  
A Technique for the Architectural Implementa- tion of Software Subsystems. In Proceedings of the 7th Symposium on Computer Architecture, pages 236-244. May 1980. [Jensen 751 K. Jensen and N.  ...  The Cm* Multiprocessor Project: A Research Review. Technical Report, Department of Computer Science, Carnegie-Mellon University, July 1980. [Jones 80b] A. K. Jones. Capability Architecture Revisited.  ... 
doi:10.1145/800001.811666 fatcat:klpvy7r2tbh35a6u7lom4tf6yi

Ongoing research and development on information protection

Jerome H. Saltzer
1974 ACM SIGOPS Operating Systems Review  
Acknowledgement Many individuals involved in the projects described here spent time patiently explaining their activities to me, putting together written descriptions for me to work from, and reviewing  ...  Thanks are due all of them, but responsibility for mistakes and omissions is my own.  ...  new computer system based on a mildly restricted implementation of the "capability" view of protection.  ... 
doi:10.1145/775275.775278 fatcat:c5o7efmfwfczln4art3y5q2n4a

Security Concerns regarding Software Development Migrations in Quantum Computing Context

Andreea-Alina Cornea, Alexandru Marius Obretin
2022 SAR Journal  
Even so, current times are defined by innovation and quantum computers future usage seems to define a totally new era of security.  ...  layer to increase protection for the modern software architectural style represented by microservices and which has become the favourite development alternative of the last years.  ...  This problem has a high level of difficulty even for quantum computing and this is the reason why NTRU cryptosystem becomes a subject of interest for industry as an alternative to define the new era of  ... 
doi:10.18421/sar51-02 doaj:ff3faf066e874684bb75eadc98bc0d70 fatcat:yr4luvpwijfebnwr5w6q23wp5y

A hardware implementation of capability-based addressing

G. J. Myers, B. R. S. Buckingham
1980 SIGARCH Computer Architecture News  
The SWARD architecture, an experimental higher-level architecture, contains the naming and protection concept of capability-based addressing.  ...  The initial representation of capability-based addressing in the architecture led to a set of problems; these problems are described, as well as their solutions.  ...  I ntrod uction The concept of viewing a computing system as a set of objects, and addressing the objects by a protected name known as a capability, has existed for 14 years [I] but has been slow in influencing  ... 
doi:10.1145/641914.641916 fatcat:ntx4j2jepffszavqkcy5i3cmd4

A hardware implementation of capability-based addressing

G. J. Myers, B. R. S. Buckingham
1980 ACM SIGOPS Operating Systems Review  
The SWARD architecture, an experimental higher-level architecture, contains the naming and protection concept of capability-based addressing.  ...  The initial representation of capability-based addressing in the architecture led to a set of problems; these problems are described, as well as their solutions.  ...  I ntrod uction The concept of viewing a computing system as a set of objects, and addressing the objects by a protected name known as a capability, has existed for 14 years [I] but has been slow in influencing  ... 
doi:10.1145/850708.850709 fatcat:nqvneiqtibfz7gyqdsm7v5pxxm

32 & 16 Years Ago

2012 Computer  
Computer's October 1980 and 1996 PDFs of the articles and departments from the award for his recent work in capability-based architecture resulting in the CAP computer at Cambridge University.  ...  Now, as we move to the integrated circuit, a new realm is again open with VLSI. Capability architectures and language-oriented architectures are only a beginning."  ... 
doi:10.1109/mc.2012.330 fatcat:vayxhv4ovffqjkmcc7cw7mrkxi

Guest Editor's Introduction to the Special Issue on Security and Privacy on Clouds

Meikang Qiu, Sun-Yuan Kung
2018 IEEE Transactions on Cloud Computing  
T HE emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources.  ...  / framework/architecture, new cryptography for cloud solutions, and cloud-oriented privacy protection and secure networks dimensions.  ...  T HE emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources.  ... 
doi:10.1109/tcc.2018.2790678 fatcat:hafi2gcq55aencxyxlfm4hboa4

Conference Report: Seventh lntemational Symposium on Computer Architecture

1980 Computer  
Frenchgage oflth smoi che by for outstanding technical contributions; ogies); and the DJS-60 series after the Jacquaes Lefanth smofiumtheansitutde tocmuebrhtetr.Atog Mo'torola 6800.  ...  , Zhiliang ex-Aleatoires. the ."  ...  Capability architectures and for a dual processor, the: HDS-9 can Michigan with the aid of one subcommitlanguage-oriented architectures are only compete with current American and tee for the US and Canada  ... 
doi:10.1109/mc.1980.1653383 fatcat:ht42s5oj6jbf5bgxugmxvy7ngq

Guest Editorial Information Technology in Automation

H. Prahofer, Valeriy Vyatkin, Alois Zoitl
2018 IEEE Transactions on Industrial Informatics  
He is currently a Professor in cyber-physical systems for engineering and production with the Johannes Kepler University, Linz, Austria.  ...  He is also a part time Professor with the Research Institute Fortiss, Munich, Germany, where he was leading the competence field Industrie 4.0.  ...  To overcome this issue, they introduce a new architecture for automation systems, the data privacypreserving automation architecture, which allows the transformation of plain application data to privacy-secure  ... 
doi:10.1109/tii.2018.2834862 fatcat:kclxtn5uabdmjkjrkbdcwzg5xy

WINES: Wired and Wireless Intelligent Networked Systems

A. Preece
2005 IEEE Intelligent Systems  
G l o b a l I S computing environments. (For more on the EPSRC, see www. epsrc.ac.uk.)  ...  In the next decade, Cambridge is projected to have 50,000 new jobs, 42,000 new homes, a 36 percent increase in car trips, and a 57 percent increase in public-transportation volume (see www.cambridgemit.org  ... 
doi:10.1109/mis.2005.116 fatcat:2unx6yegpfcr5lss6mma3uct6m

Bookshelf

2004 Computer  
The authors detail the software and techniques hackers use and provide a hands-on approach to learning the vital security skills needed to protect network systems.  ...  Send press releases and new books to Computer, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; fax +1 714 821 4010; newbooks@computer.org.  ...  This book presents new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms that developers can use to rapidly and effortlessly generate system-on-chip cores that  ... 
doi:10.1109/mc.2004.45 fatcat:6nsa45736jdpfnwvtkfularm2m

The Cambridge CAP computer and its protection system

R. M. Needham, R. D.H. Walker
1977 Proceedings of the sixth symposium on Operating systems principles - SOSP '77  
This paper gives an outline of the architecture of the CAP computer as it concerns capability-based protection and then gives an account of how protected procedures are used in the construction of an operating  ...  Acknowledgements The CAP project is supported by tile Science Research Council. We  ...  a new capability for the directory which may only be used for, for example, retrieve operations.  ... 
doi:10.1145/800214.806541 dblp:conf/sosp/NeedhamW77 fatcat:h6hv3axnlnbppov2xdjmdbtijq

Virtualization

Andrew Herbert
2015 SOSP History Day 2015 on - SOSP '15  
This idea was readily exploited capability-based operating systems such as the Cambridge CAP Computer which added to its hardware supported capabilities for memory segments abstract "software capabilities  ...  software and users to rewrite their applications to the new architecture.  ... 
doi:10.1145/2830903.2830909 dblp:conf/sosp/Herbert15 fatcat:mposov6rcjchvbagkz7476zppu
« Previous Showing results 1 — 15 out of 16,769 results