Pages that link to "Capability-based security"
Jump to navigation
Jump to search
The following pages link to Capability-based security:
Displaying 50 items.
- Computer security (← links)
- Information security (← links)
- Microprocessor (← links)
- Microkernel (← links)
- Plan 9 from Bell Labs (← links)
- Access control (← links)
- Secure cryptoprocessor (← links)
- Access-control list (← links)
- Exokernel (← links)
- L4 microkernel family (← links)
- Authorization (← links)
- Confused deputy problem (← links)
- Encapsulation (computer programming) (← links)
- William Wulf (← links)
- Transparency (human–computer interaction) (← links)
- EROS (microkernel) (← links)
- Plessey System 250 (← links)
- Plessey (← links)
- Pointer (computer programming) (← links)
- Maurice Wilkes (← links)
- Intel iAPX 432 (← links)
- Intel i960 (← links)
- Department of Computer Science and Technology, University of Cambridge (← links)
- File descriptor (← links)
- Capability-Based Computer Systems (redirect page) (← links)
- Mark Granovetter (← links)
- Authorization certificate (← links)
- Mandatory access control (← links)
- Discretionary access control (← links)
- Comparison of operating systems (← links)
- File system (← links)
- Privilege separation (← links)
- Capability (← links)
- KeyKOS (← links)
- Sandbox (computer security) (← links)
- E (programming language) (← links)
- Accent kernel (← links)
- C.mmp (← links)
- CAP computer (← links)
- Actor model (← links)
- ALGOL 68C (← links)
- Distributed object (← links)
- Marc Stiegler (← links)
- Computer security model (← links)
- Comparison of operating system kernels (← links)
- RPyC (← links)
- Shatter attack (← links)
- Unix domain socket (← links)
- Access control matrix (← links)
- NLTSS (← links)