Capability Theory by Sound Bytes
This is a collection of insights for designing capability based systems.
It may have some pertinence to object oriented design.
Here is a short introduction for the non computer specialist.
The Confused Deputy is a paper that describes a complex scenario that convinced me that capabilities were more than merely neat.
Abstraction Mechanisms for Access Control shows how capabilities are largely another perspective on the protection mechanisms found in classic object languages.
Mark Miller gives this Security Taxonomy,
and his capabilities based language E.
Read at least the abstract of this paper.
Here are a few references to operating systems that have followed these principles.
Here are some capability ideas conveyed by a real writer, and some introductory essays by Shapiro and a suite of mail lists about capabilities and such.
Capability Myths Demolished reports and rectifies several persistent misperceptions of capabilities.
I have not internalized Fred Spiessen’s thesis where he reasons about what programs are in a position to know and act upon concerning security.
Such reasoning is important but left implicit or informal in my pages.
Contrary to this article, we claim that there are computer security solutions.
Here I deplore Apple’s drift toward the walled garden.
Saltzer & Schroeder wrote a comprehensive paper in 1975 on computer security.
Mark Miller’s Thesis organizes and extends many of the ideas described here.
Here are some other perspectives on computer security.
This paper addresses some OS requirements beyond those originally considered in Keykos, but with a capability perspective.
A significant paper on the excess authority of conventional platforms.
A 2012 survey of recent work.
The Sound Bytes
A slightly intemperate Introduction
2012 Soap Box
The Natural Security of Capabilities
Building your own Security Mechanisms
Law and Order among Installers
Name as Parameter;
Don’t separate names and authority.;
Names and Capabilities
Notes on Keykos
The PC and the U.S. Congress;
My musings about Disney inside
Make Everything into an object.
Two fundamental notions
Objects & Facets
Don’t Prohibit what you can’t Prevent.
Authority and the User
Other Stake Holders in the Private Computer
Contrasting authority of programs in different OS Architectures
Confinement and The Factory;
The Factory Patent,
nexus on Covert channels
Fragmentary notes on Durability
Other styles of limiting information flow: Insulation
Don’t show the bits in capabilities.
The Blind Sort
Synergy: Rights Amplification, Sibling Communications
Rescinding or Revoking
The word “Authority”
Capabilities to Resources
Vantage Points for new functionality
Reasoning about the periphery
Principal; On whose behalf?
Early Hardware for Security;
Recent Complexity Bites,
Vague New Hardware Ideas,
Nexus on capability mapped memory
Ruminations on “Address Space”
fragmentary disk ideas
Security GUI, too
Nature of Trust
Concept Bridges for Design
The language connection
Blinding Capabilities ala Chaum
Capabilities in disguise
Other Computer Science Issues Related to Capability Designs
Upgrading object behavior
Notes on access control lists (ACL)
Metering Access to Data
Tracking access to data
Fighting over “Capability Based”
Preliminary harping on “Capabilities” for Linux.
Microsoft’s NGSCB (Palladium)
Feeble connection to Physics
quarter baked notes
Accretion of Software Systems
Bug or Feature
Insecurity from anonymous messages
Capability like Ideas
The Luring Attack
Monopoly => Complexity?
Unix as Capability System
Note on Tanenbaum’s “Can We Make Operating Systems Reliable and Secure?”
Note on Schneier’s Blog
Some limits to arguing about security
The Application Platform
Violating Rules to Enforce Rules
Web search and Security
On Virus Filters;
A notion of browser security;
Cambridge MIPS Hardware.