134:
127:
120:
411:
326:
158:
194:
231:
268:
218:
189:
33:
316:
258:
184:
164:
143:
17:
25:
278:
36:. The program running in the process does not manipulate capabilities directly, but refers to them via
303:
199:
75:
29:
385:
249:
63:
169:
214:
406:
226:
174:
52:
44:
380:
287:
400:
375:
370:
365:
311:
55:
directly, but refer to them via file descriptor numbers, which are C-list indexes.
95:
336:
344:
293:
112:
283:
263:
66:
operating systems, a process's capability registers constitute a C-list.
204:
253:
245:
241:
236:
59:
321:
273:
360:
48:
116:
51:
is an example of a C-list. Unix processes do not manipulate
353:
335:
302:
213:
151:
128:
8:
28:of capabilities, usually associated with a
135:
121:
113:
87:
7:
40:—integers indexing into the C-list.
18:capability-based computer security
14:
1:
159:Principle of least privilege
195:Capability-based addressing
428:
98:. Cap-lore.com. 2000-01-19
412:Operating system security
190:Capability-based security
185:Object-capability model
165:Confused deputy problem
32:and maintained by the
304:Programming languages
45:file descriptor table
354:Specialised hardware
76:Access-control list
386:Plessey System 250
394:
393:
215:Operating systems
170:Ambient authority
144:Object-capability
419:
200:Zooko's triangle
137:
130:
123:
114:
107:
106:
104:
103:
92:
53:file descriptors
427:
426:
422:
421:
420:
418:
417:
416:
397:
396:
395:
390:
349:
331:
298:
209:
175:File descriptor
147:
141:
111:
110:
101:
99:
94:
93:
89:
84:
72:
12:
11:
5:
425:
423:
415:
414:
409:
399:
398:
392:
391:
389:
388:
383:
381:Intel iAPX 432
378:
373:
368:
363:
357:
355:
351:
350:
348:
347:
341:
339:
333:
332:
330:
329:
324:
319:
314:
308:
306:
300:
299:
297:
296:
291:
288:HarmonyOS NEXT
281:
276:
271:
266:
261:
256:
239:
234:
229:
223:
221:
211:
210:
208:
207:
202:
197:
192:
187:
182:
177:
172:
167:
162:
155:
153:
149:
148:
142:
140:
139:
132:
125:
117:
109:
108:
86:
85:
83:
80:
79:
78:
71:
68:
38:C-list indexes
13:
10:
9:
6:
4:
3:
2:
424:
413:
410:
408:
405:
404:
402:
387:
384:
382:
379:
377:
376:IBM System/38
374:
372:
369:
367:
366:Cambridge CAP
364:
362:
359:
358:
356:
352:
346:
343:
342:
340:
338:
334:
328:
325:
323:
320:
318:
315:
313:
310:
309:
307:
305:
301:
295:
292:
289:
285:
282:
280:
277:
275:
272:
270:
267:
265:
262:
260:
257:
255:
251:
247:
243:
240:
238:
235:
233:
230:
228:
225:
224:
222:
220:
216:
212:
206:
203:
201:
198:
196:
193:
191:
188:
186:
183:
181:
178:
176:
173:
171:
168:
166:
163:
160:
157:
156:
154:
150:
145:
138:
133:
131:
126:
124:
119:
118:
115:
97:
91:
88:
81:
77:
74:
73:
69:
67:
65:
61:
56:
54:
50:
46:
41:
39:
35:
31:
27:
23:
19:
337:File systems
179:
100:. Retrieved
90:
57:
42:
37:
21:
15:
401:Categories
345:Tahoe-LAFS
294:Phantom OS
102:2019-07-08
96:"Glossary"
82:References
284:HarmonyOS
264:iMAX 432
227:Capsicum
205:Petnames
152:Concepts
146:security
70:See also
232:Fuchsia
219:kernels
58:In the
30:process
407:Arrays
312:Cajita
269:Midori
254:CapROS
246:KeyKOS
242:GNOSIS
237:Genode
180:C-list
161:(PoLP)
60:KeyKOS
34:kernel
24:is an
22:C-list
327:Joule
322:Joe-E
274:NLTSS
259:Hydra
26:array
371:Flex
361:BiiN
279:seL4
250:EROS
64:EROS
62:and
49:Unix
43:The
20:, a
47:in
16:In
403::
252:→
248:→
244:→
217:,
317:E
290:)
286:(
136:e
129:t
122:v
105:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.