The increasing problems of hacking and computer viruses have demonstrated the need for more secure computer systems. Conventional operating systems such as Unix, Linux, and Windows have not proved very satisfactory in dealing with such security problems. The capability paradigm seems to offer scope for more flexible computer system security but suffered from various implementation disadvantages. Password-capabilities allow for efficient implementation and offer scope for many security benefits. The Password-Capability System provides a simple, compact probabilistic security model. The operational semantics of the system are presented here
The security of any computer system that is configured and operated by human beings critically depen...
International audienceAssembly-level protection mechanisms (virtual memory, trusted execution enviro...
Heightened interest and increased accessibility to computer systems have presented new threats to co...
With reference to a distributed system consisting of nodes connected by a local area network, we pre...
With reference to a distributed system consisting of nodes connected by a local area network, we pre...
Conventional computer architectures provide little or no hardware support for enforcing data securit...
With reference to a distributed system consisting of nodes connected by a local area network, we pr...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
Password auditing can enhance the cyber situational awareness of defenders, e.g. cyber security/IT p...
Critical infrastructures require protection systems that are both flexible and efficient. Flexibilit...
Fifth-generation computer systems will use large numbers of processors to achieve high performance. ...
We address three common misconceptions about capability-based systems: the Equivalence Myth (access ...
We present a formal system that models programmable abstractions for access control. Composite abstr...
This paper discusses whether usable security is unattainable for some security tasks due to intrinsi...
The design of leakage-resilient password systems (LRPSes) in the absence of trusted devices remains ...
The security of any computer system that is configured and operated by human beings critically depen...
International audienceAssembly-level protection mechanisms (virtual memory, trusted execution enviro...
Heightened interest and increased accessibility to computer systems have presented new threats to co...
With reference to a distributed system consisting of nodes connected by a local area network, we pre...
With reference to a distributed system consisting of nodes connected by a local area network, we pre...
Conventional computer architectures provide little or no hardware support for enforcing data securit...
With reference to a distributed system consisting of nodes connected by a local area network, we pr...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
Password auditing can enhance the cyber situational awareness of defenders, e.g. cyber security/IT p...
Critical infrastructures require protection systems that are both flexible and efficient. Flexibilit...
Fifth-generation computer systems will use large numbers of processors to achieve high performance. ...
We address three common misconceptions about capability-based systems: the Equivalence Myth (access ...
We present a formal system that models programmable abstractions for access control. Composite abstr...
This paper discusses whether usable security is unattainable for some security tasks due to intrinsi...
The design of leakage-resilient password systems (LRPSes) in the absence of trusted devices remains ...
The security of any computer system that is configured and operated by human beings critically depen...
International audienceAssembly-level protection mechanisms (virtual memory, trusted execution enviro...
Heightened interest and increased accessibility to computer systems have presented new threats to co...