skip to main content
article
Free access

The Confused Deputy: (or why capabilities might have been invented)

Published: 01 October 1988 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    {1} Hardy, N., "KeyKOS Architecture," Operating Systems Review, Association for Computing Machinery September, 1985. (Also available in an modified version as publication KL068 from Key Logic.)
    [2]
    {2} Rajunas, S. A., et al., "Security in KeyKOS," Proceedings of the 1986 IEEE Symposium on Security and Privacy, IEEE.
    [3]
    {3} U.S. patent number 4,584,639.
    [4]
    {4} Department of Defense Trusted Computer System Evaluation Criteria, U.S. Department of Defense, DOD 5200.28-STD, December, 1985.
    [5]
    {5} KeyKOS and Mutually Suspicious Users (KL108), 1987, Key Logic.

    Cited By

    View all
    • (2024)Enabling Secure and Efficient Sharing of Accelerators in Expeditionary SystemsJournal of Hardware and Systems Security10.1007/s41635-024-00148-4Online publication date: 8-May-2024
    • (2024)Model-Driven Security Smell Resolution in Microservice Architecture Using LEMMASoftware Technologies10.1007/978-3-031-61753-9_3(29-49)Online publication date: 24-May-2024
    • (2023)BunnyHopProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620647(7321-7337)Online publication date: 9-Aug-2023
    • Show More Cited By

    Index Terms

    1. The Confused Deputy: (or why capabilities might have been invented)
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM SIGOPS Operating Systems Review
        ACM SIGOPS Operating Systems Review  Volume 22, Issue 4
        Oct. 1988
        31 pages
        ISSN:0163-5980
        DOI:10.1145/54289
        Issue’s Table of Contents

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 October 1988
        Published in SIGOPS Volume 22, Issue 4

        Check for updates

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)318
        • Downloads (Last 6 weeks)24

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Enabling Secure and Efficient Sharing of Accelerators in Expeditionary SystemsJournal of Hardware and Systems Security10.1007/s41635-024-00148-4Online publication date: 8-May-2024
        • (2024)Model-Driven Security Smell Resolution in Microservice Architecture Using LEMMASoftware Technologies10.1007/978-3-031-61753-9_3(29-49)Online publication date: 24-May-2024
        • (2023)BunnyHopProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620647(7321-7337)Online publication date: 9-Aug-2023
        • (2023)Confusum contractumProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620338(1793-1810)Online publication date: 9-Aug-2023
        • (2023)CAPSTONEProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620282(787-804)Online publication date: 9-Aug-2023
        • (2023)Unsafe at any copyProceedings of the 21st USENIX Conference on File and Storage Technologies10.5555/3585938.3585950(183-197)Online publication date: 21-Feb-2023
        • (2023)SysPart: Automated Temporal System Call Filtering for BinariesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623207(1979-1993)Online publication date: 15-Nov-2023
        • (2023)Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit AccessesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321466620:5(3716-3733)Online publication date: 31-Aug-2023
        • (2023)Triaging Android Systems Using Bayesian Attack Graphs2023 IEEE Secure Development Conference (SecDev)10.1109/SecDev56634.2023.00031(171-183)Online publication date: 18-Oct-2023
        • (2023)EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179285(2990-3007)Online publication date: May-2023
        • Show More Cited By

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media