Tagged/Capability Architectures

نویسنده

  • Shamik Das
چکیده

Conventional computer architectures provide little or no hardware support for enforcing data security. Access control, if implemented, is left to the operating system, which typically means that access lists are maintained by the system on a per-object basis. However, a class of machines called capability architectures exists in which hardware support for security checking has been implemented. Capability concepts have also been implemented at the operating-system level so that they may be utilized on processors without such hardware support. A capability is defined as a tag, token, or key that gives the possessor of the capability permissions on an entity or object [2]. It is specific to the object, not the possessor, and is usually implemented as an object identifier paired with an identifier for the particular access rights on that object. Thus, a capability system is one in which security is enforced by issuing object or process capabilities to the entities that require them rather than maintaining access control lists for each object or process. There are several benefits and consequences to such a security implementation. For example, capabilities must be unforgeable, since they are not associated with particular processes. Also, capabilities must be unmodifiable – it should not be possible for a process to change its “read” capabilities into “write” capabilities without express permission. Another property is context-independence, as any use of a capability means the same thing for any user, in whatever way it is used. Capabilities are easily transferred from one entity to another, so a process may grant its capabilities to any other process. However, once such capabilities are granted, they are not easily revoked, since the capabilities that belong to both processes are identical. Finally, by encapsulating accesses to memory, filesystems, devices, etc. with capabilities, a capability architecture can present a uniform means of access to the shared resources of a system. To visualize capability models versus access-control models, it is helpful to consider the system object access matrix. Along the horizontal axis, the system objects (files, devices, etc.) are listed, and along the vertical axis, those entities that may access objects are listed. At each intersection, access rights for that particular entity to that particular object are listed. Within this framework, the traditional access-control list consists of a column of this matrix – for each object, the system maintains a list of access permissions for the users that have access. Capability

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tag Management in a Reconfigurable Tagged-Token Dataflow Architecture

Combining dataflow concepts with reconfigurable computing provides a great potential to exploit the application parallelism efficiently. However, to express such parallelism cannot be a trivial task. Therefore, there is a great effort to automatically translate programs originally written in procedural languages (like C and Java) into dataflow architectures which express the parallelism in a na...

متن کامل

An Ontology for Evaluation of Network Enabled Capability Architectures

The UK Ministry of Defence’s Network Enabled Capability and USA Department of Defence’s Network-Centric Warfare programmes, are aimed at improving military effectiveness through the networking of existing and new military assets. Research is being carried out into architectures needed to support Network Enabled Capability – including emerging software architectures such as Service Oriented Arch...

متن کامل

Framework for Capability and Maturity Evaluation of Service-oriented Enterprise Architectures

SOAMMI a new framework for evaluating capabilities for change of enterprise and service-oriented software architectures is introduced. Current approaches for assessing maturity of software architectures are intuitively developed, having sparse metamodel foundation and being hardly validated. This is a real problem because enterprise and software architects should know what the successful path f...

متن کامل

Multilink Processors (Link 11/16/22) and Integration Architectures

Data Link systems can be deployed to various platforms (ship, air, and land) in four different architectures: 1. Multilink Processor is embedded into Combat Management System (CMS)/ Avionic Mission Computer over native interface for full functionality 2. Multilink Processor integrated to legacy CMS with an adaptation module and adding Link Console for enhanced modernization in case CMS has limi...

متن کامل

Estimation of Eulerian strain from tagged CMR images using band-pass optical flow and HARP

Background Tagged MRI images are usually used for measuring regional measures of myocardial contractility, e.g. strain. Different methods area available for analyzing the tagged images, including harmonic phase (HARP) and optical flow (OF). HARP analysis is widely spread due to its robustness and fast processing, although it fails to measure strain on the endocardial and epicardial borders [1]....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000