Capability-based security is a concept in the design of secure computing systems, one of the existing security models. A capability (known in some systems...
14 KB (1,668 words) - 22:55, 12 June 2025
The object-capability model is a computer security model. A capability describes a transferable right to perform one (or more) operations on a given object...
8 KB (1,009 words) - 12:37, 12 June 2025
In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users...
18 KB (2,197 words) - 19:35, 22 July 2025
memory as an efficient implementation of capability-based security. Under a capability-based addressing scheme, pointers are replaced by protected objects...
8 KB (908 words) - 16:50, 24 January 2025
access control (ReBAC) Rule-set-based access control (RSBAC) Capability-based security Risk-based authentication Classified information Federated identity...
15 KB (1,827 words) - 22:45, 22 July 2025
approach Capability-based security Capability management Capability management in business Capability Maturity Model Integration Capability Brown (1716–1783)...
697 bytes (105 words) - 14:27, 5 September 2023
adversely impacts the whole. Capability approach Capability-based security Capability (systems engineering) Capability management in business Outline...
9 KB (1,025 words) - 04:17, 25 May 2024
Capability-based operating system generally refers to an operating system that uses capability-based security. Examples include: Hydra KeyKOS EROS Midori...
719 bytes (36 words) - 21:31, 14 June 2025
EROS (microkernel) (category Capability systems)
process persistence, some preliminary real-time support, and capability-based security. EROS is purely a research operating system, and was never deployed...
14 KB (1,571 words) - 13:13, 26 November 2024
Discretionary access control (redirect from Group-based access control)
Organisation-based access control (OrBAC) Role-based access control (RBAC) Rule-set-based access control (RSBAC) Capability-based security Risk-based authentication...
5 KB (563 words) - 14:06, 16 January 2025
Confused deputy problem (category Computer security)
of why capability-based security is important. Capability systems protect against the confused deputy problem, whereas access-control list–based systems...
9 KB (1,220 words) - 18:33, 9 August 2025
security) Lattice-based access control (LBAC) Mandatory access control (MAC) Multi-level security (MLS) Non-interference (security) Object-capability...
2 KB (184 words) - 14:25, 17 July 2024
can be used to implement a rudimentary form of capability-based security. Network socket – Software-based endpoint of network communications Berkeley sockets –...
4 KB (477 words) - 12:38, 17 July 2025
Cap'n Proto (section Capability security)
HTTP, TCP, and UDP. The Cap'n Proto RPC standard has a rich capability security model based on the CapTP protocol used by the E programming language. As...
12 KB (1,150 words) - 10:59, 28 July 2025
Capsicum (Unix) (category Capability systems)
Capsicum is an implementation of capability-based security for UNIX and similar systems. Presented at USENIX 2010, the system is part of FreeBSD since...
3 KB (332 words) - 21:45, 7 November 2024
addressing (although rc, the Plan 9 shell, is text-based). Plan 9 also introduced capability-based security and a log-structured file system called Fossil...
59 KB (5,991 words) - 17:23, 20 July 2025
(MAC) or discretionary access control (DAC). A further approach, capability-based security has been mostly restricted to research operating systems. Capabilities...
220 KB (22,295 words) - 22:54, 28 July 2025
Memory protection (redirect from Memory security)
commercial products used capability based security: Plessey System 250, IBM System/38, Intel iAPX 432 architecture and KeyKOS. Capability approaches are widely...
18 KB (2,268 words) - 16:46, 24 January 2025
related programs. Comparison of known unpatched vulnerabilities based on Secunia & SecurityFocus reports with severity of Not critical & above. Update lists...
80 KB (1,734 words) - 09:19, 8 August 2025
Backup Capability-based security Data-centric security Enterprise information security architecture Gordon–Loeb model for information security investments...
161 KB (18,151 words) - 22:34, 29 July 2025
authorized tasks with only read permission. User Account Control Capability-based security Compartmentalization (intelligence) Confused deputy problem Encapsulation...
15 KB (1,761 words) - 17:55, 19 May 2025
friend in C++. Systems that provide object-level capability-based security (adhering to the object-capability model) are an exception, and guarantee strong...
16 KB (1,425 words) - 01:02, 16 June 2025
Access Control (MAC) Role-Based Access Control (RBAC) Capability-based security Post-cloning operations "[MS-AZOD]: Security Identifiers (SIDs)". learn...
20 KB (1,475 words) - 08:37, 1 August 2025
list Attribute-based access control (ABAC) Bell–LaPadula model Biba Model Capability-based security Computer security model Context-based access control...
3 KB (339 words) - 12:40, 9 July 2024
Cacls Capability-based security C-list Confused deputy problem DACL Extended file attributes File-system permissions Privilege (computing) Role-based access...
16 KB (1,681 words) - 11:36, 2 August 2025
Genode (category Capability systems)
report was to determine the practicality of a component-based OS using capability-based security. This work was influenced by concurrent research at Dresden...
11 KB (1,103 words) - 03:50, 10 August 2025
Cambridge. ALGOL 68C was later used for the CHAOS OS for the capability-based security CAP computer at University of Cambridge in 1971. Other early contributors...
9 KB (944 words) - 07:46, 24 May 2025
Attribute-based access control (ABAC) Capability-based security Context-based access control (CBAC) Discretionary access control (DAC) Graph-based access...
6 KB (692 words) - 16:50, 23 January 2025
RSBAC (redirect from Rule-set-based access control)
Organisation-based access control (OrBAC) Role-based access control (RBAC) Capability-based security Risk-based authentication Computer security Security-Enhanced...
6 KB (706 words) - 20:03, 21 December 2024
In computing, managed security services (MSS) are network security services that have been outsourced to a service provider. A company providing such a...
17 KB (1,929 words) - 06:48, 9 July 2025