Communications of the ACM
Protection in programming languages
Communications of the ACM
A note on the confinement problem
Communications of the ACM
SIMULA: an ALGOL-based simulation language
Communications of the ACM
Overview of the Hydra Operating System development
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Policy/mechanism separation in Hydra
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The enforcement of security policies for computation
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS
NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS
COOPERATION OF MUTUALLY SUSPICIOUS SUBSYSTEMS IN A COMPUTER UTILITY
COOPERATION OF MUTUALLY SUSPICIOUS SUBSYSTEMS IN A COMPUTER UTILITY
Protection in programmed systems.
Protection in programmed systems.
Computer system organization: The B5700/B6700 series (ACM monograph series)
Computer system organization: The B5700/B6700 series (ACM monograph series)
SDE 3 Proceedings of the third ACM SIGSOFT/SIGPLAN software engineering symposium on Practical software development environments
Authentication Mechanisms in Microprocessor-Based Local Area Networks
IEEE Transactions on Software Engineering
Performance Properties of Vertically Partitioned Object-Oriented Systems
IEEE Transactions on Software Engineering
A formal protection model of security in centralized, parallel, and distributed systems
ACM Transactions on Computer Systems (TOCS)
Distributed, object-based programming systems
ACM Computing Surveys (CSUR)
The muse object architecture: a new operating system structuring concept
ACM SIGOPS Operating Systems Review
An approach to safe object sharing
OOPSLA '00 Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Fault Tolerant Operating Systems
ACM Computing Surveys (CSUR)
Operating System Structures to Support Security and Reliable Software
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Medusa: an experiment in distributed operating system structure
Communications of the ACM
Letters to the editor: A protection model and its implementation in a dataflow system
Communications of the ACM
Separating access control policy, enforcement, and functionality in extensible systems
ACM Transactions on Computer Systems (TOCS)
A Notation for Deterministic Cooperating Processes
IEEE Transactions on Parallel and Distributed Systems
A hardware implementation of capability-based addressing
ACM SIGARCH Computer Architecture News
An extensible file system for hydra
ICSE '78 Proceedings of the 3rd international conference on Software engineering
Overview of the Hydra Operating System development
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Policy/mechanism separation in Hydra
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Information transmission in computational systems
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
In support of domain structure for operating systems
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
The architecture of the Eden system
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
Zeus: An object-oriented distributed operating system for reliable applications
ACM '84 Proceedings of the 1984 annual conference of the ACM on The fifth generation challenge
A hardware implementation of capability-based addressing
ACM SIGOPS Operating Systems Review
Ada packages and distributed systems
ACM SIGPLAN Notices
XOS: an operating system for the X-tree architecture
ACM SIGOPS Operating Systems Review
Heap protection for Java virtual machines
PPPJ '06 Proceedings of the 4th international symposium on Principles and practice of programming in Java
Countering targeted file attacks using locationguard
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Unified support for heterogeneous security policies in distributed systems
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Providing policy control over object operations in a mach based system
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Experience distributing objects in an SMMP OS
ACM Transactions on Computer Systems (TOCS)
Capability Based Tagged Architectures
IEEE Transactions on Computers
Design of HM2p A Hierarchical Multimicroprocessor for General-Purpose Applications
IEEE Transactions on Computers
Java heap protection for debugging native methods
Science of Computer Programming
Protectit: trusted distributed services operating on sensitive data
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
Memory-Centric Security Architecture
Transactions on High-Performance Embedded Architectures and Compilers I
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
A microkernel API for fine-grained decomposition
Proceedings of the Fifth Workshop on Programming Languages and Operating Systems
Ribbons: a partially shared memory programming model
Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications
A taste of Capsicum: practical capabilities for UNIX
Communications of the ACM
Memory-centric security architecture
HiPEAC'05 Proceedings of the First international conference on High Performance Embedded Architectures and Compilers
Information leakage and capability forgery in a capability-based operating system kernel
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Covert channel analysis of the password-capability system
ACSAC'05 Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture
Securing information gateways with derivation-constrained access control
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
SilverLine: preventing data leaks from compromised web applications
Proceedings of the 29th Annual Computer Security Applications Conference
Hi-index | 0.05 |
This paper describes the capability based protection mechanisms provided by the Hydra Operating System Kernel. These mechanisms support the construction of user-defined protected subsystems, including file and directory subsystems, which do not therefore need to be supplied directly by Hydra. In addition, we discuss a number of well known protection problems, including Mutual Suspicion, Confinement and Revocation, and we present the mechanisms that Hydra supplies in order to solve them.