Affiliation:
1. Universidad Central de Venezuela, Faeultad de Ciencias, Escuela de Computación
Abstract
In the course of the last three decades,
capabilities
have been successfully used to implement protection systems in multiples scenarios and platforms. Although the basic idea remains the same, a wide variety of techniques have been used in the implementation and administration of
capabilities
. As new paradigms emerged, the concept of
capabilities
has shown to scale very well with the change of models. As a matter of fact, several modern computational environments (particularly distributed ones) use some sort of
capabilities
as a protection mechanism. The goal of this paper is to review the main ideas related to
capabilities
as well as several of the approaches chosen in their implementation and use. This work is primarily intended as a support document for courses on operating systems and programming languages.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Graphics and Computer-Aided Design,Software
Reference11 articles.
1. [
2
] J. B. Dennis and E. C. van Horn "Programming Semantics for Multiprogrammed Computations" CACM (v. 9 N. 3 1966). 10.1145/365230.365252 [2] J. B. Dennis and E. C. van Horn "Programming Semantics for Multiprogrammed Computations" CACM (v. 9 N. 3 1966). 10.1145/365230.365252
2. [
3
] B.W. Lampson "Protection" O.S. Review (V. 8 N. 1 1974). 10.1145/775265.775268 [3] B.W. Lampson "Protection" O.S. Review (V. 8 N. 1 1974). 10.1145/775265.775268
3. [
4
] G. J. Nutt "Protection" Chapter 8 Centralized and Distributed Operating Systems Prentice Hall 1992 ISBN 0-13-122326-7. [4] G. J. Nutt "Protection" Chapter 8 Centralized and Distributed Operating Systems Prentice Hall 1992 ISBN 0-13-122326-7.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献