{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:38:31Z","timestamp":1725550711104},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540296430"},{"type":"electronic","value":"9783540321088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11572961_53","type":"book-chapter","created":{"date-parts":[[2005,10,18]],"date-time":"2005-10-18T11:06:07Z","timestamp":1129633567000},"page":"655-668","source":"Crossref","is-referenced-by-count":2,"title":["Covert Channel Analysis of the Password-Capability System"],"prefix":"10.1007","author":[{"given":"Dan","family":"Mossop","sequence":"first","affiliation":[]},{"given":"Ronald","family":"Pose","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1145\/365230.365252","volume":"9","author":"J.B. Dennis","year":"1966","unstructured":"Dennis, J.B., Van Horn, E.C.: Programming semantics for multiprogrammed computations. Communications of the ACM\u00a09, 143\u2013155 (1966)","journal-title":"Communications of the ACM"},{"key":"53_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/641914.641916","volume":"8","author":"G.J. Myers","year":"1980","unstructured":"Myers, G.J., Buckingham, B.R.S.: A hardware implementation of capability-based addressing. ACM SIGARCH Computer Architecture News\u00a08, 12\u201324 (1980)","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"53_CR3","unstructured":"Keedy, J.L., Espenlaub, K., Hellman, R., Pose, R.D.: SPEEDOS: How to achieve high security and understand it. In: Proceedings of CERT Conf. 2000, Omaha, Nebraska, USA (2000)"},{"key":"53_CR4","doi-asserted-by":"crossref","unstructured":"Abramson, D.A., Rosenberg, J.: The microarchitecture of a capability-based computer. In: Proceedings of the 19th annual workshop on Microprogramming, New York, USA, pp. 138\u2013145 (1986)","DOI":"10.1145\/19551.19546"},{"key":"53_CR5","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1145\/800213.806532","volume-title":"Proceedings of the Fifth ACM Symposium on Operating System Principles","author":"E. Cohen","year":"1975","unstructured":"Cohen, E., Jefferson, D.: Protection in the Hydra operating system. In: Proceedings of the Fifth ACM Symposium on Operating System Principles, pp. 141\u2013160. ACM Press, New York (1975)"},{"key":"53_CR6","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/850697.850702","volume":"14","author":"A.K. Jones","year":"1980","unstructured":"Jones, A.K.: Capability architecture revisited. Operating Systems Review\u00a014, 33\u201335 (1980)","journal-title":"Operating Systems Review"},{"key":"53_CR7","doi-asserted-by":"crossref","unstructured":"Mossop, D., Pose, R.: Semantics of the Password-Capability System. In: Proceedings of the IADIS International Conference, Applied Computing 2005, vol.\u00a01, pp. 121\u2013128 (2005)","DOI":"10.1109\/TENCON.2005.301334"},{"key":"53_CR8","unstructured":"Castro, M.D.: The Walnut Kernel: A Password-Capability Based Operating System. PhD thesis, Monash University (1996)"},{"key":"53_CR9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/978-1-4471-3178-6_6","volume-title":"Security and Persistence","author":"C.S. Wallace","year":"1990","unstructured":"Wallace, C.S., Pose, R.D.: Charging in a secure environment. In: Security and Persistence, pp. 85\u201397. Springer, Heidelberg (1990)"},{"key":"53_CR10","first-page":"122","volume":"20","author":"M. Anderson","year":"1988","unstructured":"Anderson, M., Wallace, C.S.: Some comments on the implementation of capabilities. The Australian Computer Journal\u00a020, 122\u2013130 (1988)","journal-title":"The Australian Computer Journal"},{"key":"53_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/comjnl\/29.1.1","volume":"29","author":"M. Anderson","year":"1986","unstructured":"Anderson, M., Pose, R.D., Wallace, C.S.: A password-capability system. The Computer Journal\u00a029, 1\u20138 (1986)","journal-title":"The Computer Journal"},{"key":"53_CR12","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1002\/(SICI)1097-024X(19980725)28:9<901::AID-SPE181>3.0.CO;2-7","volume":"28","author":"G. Heiser","year":"1998","unstructured":"Heiser, G., Elphinstone, K., Vochteloo, J., Russell, S., Liedtke, J.: The Mungi single-address-space operating system. Software Practice and Experience\u00a028, 901\u2013928 (1998)","journal-title":"Software Practice and Experience"},{"key":"53_CR13","unstructured":"Vochteloo, J.: Design, Implementation and Performance of Protection in the Mungi Single-Address-Space Operating System. PhD thesis, University of NSW, Sydney 2052, Australia (1998)"},{"key":"53_CR14","doi-asserted-by":"crossref","unstructured":"Vochteloo, J., Elphinstone, K., Russell, S., Heiser, G.: Protection domain extensions in Mungi. In: Proceedings of the 5th IEEE International Workshop on Object Orientation in Operating Systems, Seattle, WA, USA (1996)","DOI":"10.1109\/IWOOOS.1996.557913"},{"key":"53_CR15","doi-asserted-by":"crossref","unstructured":"Vochteloo, J., Russell, S., Heiser, G.: Capability-based protection in the Mungi operating system. In: Proceedings of the 3rd IEEE International Workshop on Object Orientation in Operating Systems, Asheville, NC, USA (1993)","DOI":"10.1109\/IWOOOS.1993.324922"},{"key":"53_CR16","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/WWOS.1992.275684","volume-title":"Proceedings of the Third Workshop on Workstation Operating Systems","author":"J.S. Chase","year":"1992","unstructured":"Chase, J.S., Baker-Harvey, M., Levy, H.M., Lazowska, E.D.: Opal: A single address space system for 64-bit architectures. In: Proceedings of the Third Workshop on Workstation Operating Systems, pp. 80\u201385. ACM Press, New York (1992)"},{"key":"53_CR17","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B.W. Lampson","year":"1973","unstructured":"Lampson, B.W.: A note on the confinement problem. Communications of the ACM\u00a016, 613\u2013615 (1973)","journal-title":"Communications of the ACM"},{"key":"53_CR18","unstructured":"NCSC. A guide to understanding covert channel analysis of trusted systems. Technical Report NCSC-TG-030, National Computer Security Center (1993)"},{"key":"53_CR19","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/32.55086","volume":"16","author":"C.R. Tsai","year":"1990","unstructured":"Tsai, C.R., Gligor, V.D., Chandersekaran, C.: A formal method for the identification of covert storage channels in source code. IEEE Transactions on Software Engineering\u00a016, 569\u2013580 (1990)","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Systems Architecture"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11572961_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:55:51Z","timestamp":1605642951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11572961_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540296430","9783540321088"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11572961_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}