Capability-based security is a concept in the design of secure computing systems, one of the existing security models. A capability (known in some systems...
14 KB (1,678 words) - 02:03, 8 March 2025
memory as an efficient implementation of capability-based security. Under a capability-based addressing scheme, pointers are replaced by protected objects...
8 KB (908 words) - 16:50, 24 January 2025
In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users...
19 KB (2,300 words) - 20:54, 16 January 2025
The object-capability model is a computer security model. A capability describes a transferable right to perform one (or more) operations on a given object...
8 KB (1,026 words) - 05:43, 10 October 2024
access control (ReBAC) Rule-set-based access control (RSBAC) Capability-based security Risk-based authentication Classified information Federated identity...
15 KB (1,822 words) - 21:59, 30 December 2024
Capability-based operating system generally refers to an operating system that uses capability-based security. Examples include: Hydra KeyKOS EROS Midori...
753 bytes (36 words) - 23:49, 23 April 2025
approach Capability-based security Capability management Capability management in business Capability Maturity Model Integration Capability Brown (1716–1783)...
697 bytes (105 words) - 14:27, 5 September 2023
security) Lattice-based access control (LBAC) Mandatory access control (MAC) Multi-level security (MLS) Non-interference (security) Object-capability...
2 KB (184 words) - 14:25, 17 July 2024
adversely impacts the whole. Capability approach Capability-based security Capability (systems engineering) Capability management in business Outline...
9 KB (1,025 words) - 04:17, 25 May 2024
Discretionary access control (redirect from Group-based access control)
Organisation-based access control (OrBAC) Role-based access control (RBAC) Rule-set-based access control (RSBAC) Capability-based security Risk-based authentication...
5 KB (563 words) - 14:06, 16 January 2025
access control (MAC) Role-based access control (RBAC) Rule-set-based access control (RSBAC) Capability-based security Risk-based authentication Bell–LaPadula...
3 KB (292 words) - 16:32, 4 May 2025
EROS (microkernel) (category Capability systems)
process persistence, some preliminary real-time support, and capability-based security. EROS is purely a research operating system, and was never deployed...
14 KB (1,571 words) - 13:13, 26 November 2024
Confused deputy problem (category Computer security)
of why capability-based security is important. Capability systems protect against the confused deputy problem, whereas access-control list–based systems...
9 KB (1,220 words) - 16:23, 2 January 2025
list Attribute-based access control (ABAC) Bell–LaPadula model Biba Model Capability-based security Computer security model Context-based access control...
3 KB (339 words) - 12:40, 9 July 2024
(MAC) or discretionary access control (DAC). A further approach, capability-based security has been mostly restricted to research operating systems. Capabilities...
220 KB (22,338 words) - 20:40, 28 April 2025
can be used to implement a rudimentary form of capability-based security. Network socket – Software-based endpoint of network communications Berkeley sockets –...
4 KB (482 words) - 11:56, 26 March 2025
Cap'n Proto (section Capability security)
HTTP, TCP, and UDP. The Cap'n Proto RPC standard has a rich capability security model based on the CapTP protocol used by the E programming language. As...
12 KB (1,150 words) - 06:34, 8 May 2024
related programs. Comparison of known unpatched vulnerabilities based on Secunia & SecurityFocus reports with severity of Not critical & above. Update lists...
80 KB (1,736 words) - 18:22, 8 April 2025
friend in C++. Systems that provide object-level capability-based security (adhering to the object-capability model) are an exception, and guarantee strong...
16 KB (1,433 words) - 09:37, 12 April 2025
Backup Capability-based security Data-centric security Enterprise information security architecture Gordon–Loeb model for information security investments...
159 KB (18,159 words) - 22:30, 4 May 2025
authorized tasks with only read permission. User Account Control Capability-based security Compartmentalization (intelligence) Confused deputy problem Encapsulation...
15 KB (1,761 words) - 13:59, 5 May 2025
Access control matrix (category Computer security models)
dynamic behaviour. Access control list (ACL) Capability-based security Computer security model Computer security policy Lampson, Butler W. (1971). "Protection"...
4 KB (546 words) - 13:34, 8 November 2022
Memory protection (redirect from Memory security)
commercial products used capability based security: Plessey System 250, IBM System/38, Intel iAPX 432 architecture and KeyKOS. Capability approaches are widely...
18 KB (2,268 words) - 16:46, 24 January 2025
Access Control (MAC) Role-Based Access Control (RBAC) Capability-based security Post-cloning operations "[MS-AZOD]: Security Identifiers (SIDs)". learn...
20 KB (1,475 words) - 06:47, 24 March 2025
Genode (category Capability systems)
report was to determine the practicality of a component-based OS using capability-based security. This work was influenced by concurrent research at Dresden...
11 KB (1,124 words) - 07:04, 1 May 2025
physical security systems or even telephone servers. Access control list Attribute-based access control (ABAC) Capability-based security Context-based access...
6 KB (771 words) - 02:27, 12 August 2024
Capsicum (Unix) (category Capability systems)
Capsicum is an implementation of capability-based security for UNIX and similar systems. Presented at USENIX 2010, the system is part of FreeBSD since...
3 KB (332 words) - 21:45, 7 November 2024
Attribute-based access control (ABAC) Capability-based security Context-based access control (CBAC) Discretionary access control (DAC) Graph-based access...
6 KB (692 words) - 16:50, 23 January 2025
Cacls Capability-based security C-list Confused deputy problem DACL Extended file attributes File-system permissions Privilege (computing) Role-based access...
15 KB (1,577 words) - 11:24, 11 March 2025
Organisation-based access control (OrBAC) Role-based access control (RBAC) Rule-set-based access control (RSBAC) Capability-based security Risk-based authentication...
4 KB (401 words) - 22:04, 30 December 2024