Knowledge (XXG)

C-list (computer security)

Source 📝

134: 127: 120: 411: 326: 158: 194: 231: 268: 218: 189: 33: 316: 258: 184: 164: 143: 17: 25: 278: 36:. The program running in the process does not manipulate capabilities directly, but refers to them via 303: 199: 75: 29: 385: 249: 63: 169: 214: 406: 226: 174: 52: 44: 380: 287: 400: 375: 370: 365: 311: 55:
directly, but refer to them via file descriptor numbers, which are C-list indexes.
95: 336: 344: 293: 112: 283: 263: 66:
operating systems, a process's capability registers constitute a C-list.
204: 253: 245: 241: 236: 59: 321: 273: 360: 48: 116: 51:
is an example of a C-list. Unix processes do not manipulate
353: 335: 302: 213: 151: 128: 8: 28:of capabilities, usually associated with a 135: 121: 113: 87: 7: 40:—integers indexing into the C-list. 18:capability-based computer security 14: 1: 159:Principle of least privilege 195:Capability-based addressing 428: 98:. Cap-lore.com. 2000-01-19 412:Operating system security 190:Capability-based security 185:Object-capability model 165:Confused deputy problem 32:and maintained by the 304:Programming languages 45:file descriptor table 354:Specialised hardware 76:Access-control list 386:Plessey System 250 394: 393: 215:Operating systems 170:Ambient authority 144:Object-capability 419: 200:Zooko's triangle 137: 130: 123: 114: 107: 106: 104: 103: 92: 53:file descriptors 427: 426: 422: 421: 420: 418: 417: 416: 397: 396: 395: 390: 349: 331: 298: 209: 175:File descriptor 147: 141: 111: 110: 101: 99: 94: 93: 89: 84: 72: 12: 11: 5: 425: 423: 415: 414: 409: 399: 398: 392: 391: 389: 388: 383: 381:Intel iAPX 432 378: 373: 368: 363: 357: 355: 351: 350: 348: 347: 341: 339: 333: 332: 330: 329: 324: 319: 314: 308: 306: 300: 299: 297: 296: 291: 288:HarmonyOS NEXT 281: 276: 271: 266: 261: 256: 239: 234: 229: 223: 221: 211: 210: 208: 207: 202: 197: 192: 187: 182: 177: 172: 167: 162: 155: 153: 149: 148: 142: 140: 139: 132: 125: 117: 109: 108: 86: 85: 83: 80: 79: 78: 71: 68: 38:C-list indexes 13: 10: 9: 6: 4: 3: 2: 424: 413: 410: 408: 405: 404: 402: 387: 384: 382: 379: 377: 376:IBM System/38 374: 372: 369: 367: 366:Cambridge CAP 364: 362: 359: 358: 356: 352: 346: 343: 342: 340: 338: 334: 328: 325: 323: 320: 318: 315: 313: 310: 309: 307: 305: 301: 295: 292: 289: 285: 282: 280: 277: 275: 272: 270: 267: 265: 262: 260: 257: 255: 251: 247: 243: 240: 238: 235: 233: 230: 228: 225: 224: 222: 220: 216: 212: 206: 203: 201: 198: 196: 193: 191: 188: 186: 183: 181: 178: 176: 173: 171: 168: 166: 163: 160: 157: 156: 154: 150: 145: 138: 133: 131: 126: 124: 119: 118: 115: 97: 91: 88: 81: 77: 74: 73: 69: 67: 65: 61: 56: 54: 50: 46: 41: 39: 35: 31: 27: 23: 19: 337:File systems 179: 100:. Retrieved 90: 57: 42: 37: 21: 15: 401:Categories 345:Tahoe-LAFS 294:Phantom OS 102:2019-07-08 96:"Glossary" 82:References 284:HarmonyOS 264:iMAX 432 227:Capsicum 205:Petnames 152:Concepts 146:security 70:See also 232:Fuchsia 219:kernels 58:In the 30:process 407:Arrays 312:Cajita 269:Midori 254:CapROS 246:KeyKOS 242:GNOSIS 237:Genode 180:C-list 161:(PoLP) 60:KeyKOS 34:kernel 24:is an 22:C-list 327:Joule 322:Joe-E 274:NLTSS 259:Hydra 26:array 371:Flex 361:BiiN 279:seL4 250:EROS 64:EROS 62:and 49:Unix 43:The 20:, a 47:in 16:In 403:: 252:→ 248:→ 244:→ 217:, 317:E 290:) 286:( 136:e 129:t 122:v 105:.

Index

capability-based computer security
array
process
kernel
file descriptor table
Unix
file descriptors
KeyKOS
EROS
Access-control list
"Glossary"
v
t
e
Object-capability
Principle of least privilege
Confused deputy problem
Ambient authority
File descriptor
C-list
Object-capability model
Capability-based security
Capability-based addressing
Zooko's triangle
Petnames
Operating systems
kernels
Capsicum
Fuchsia
Genode

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.