Documentation
From Erights
(Links to relevant Google Techtalks) |
(→Books and Theses: fix title) |
||
Line 10: | Line 10: | ||
[http://www.erights.org/talks/thesis/index.html Robust Composition] - Towards a Unified Approach to Access Control and Concurrency Control. This is [[User:MarkM|Mark Miller]]'s PhD disseration, and it explains the rationale, philosophy, and goals of '''''E''''' and related systems. | [http://www.erights.org/talks/thesis/index.html Robust Composition] - Towards a Unified Approach to Access Control and Concurrency Control. This is [[User:MarkM|Mark Miller]]'s PhD disseration, and it explains the rationale, philosophy, and goals of '''''E''''' and related systems. | ||
- | [[ | + | [[Safe Serialization Under Mutual Suspicion]] (Wiki conversion in progress) |
== Tutorials == | == Tutorials == |
Revision as of 17:10, 6 February 2008
Contents |
Books and Theses
Patterns of Safe Collaboration
Object-Capability Security in Virtual Environments
E in a Walnut - This is a basic tutorial on the E language covering basic, distributed, and secure distributed programming.
Robust Composition - Towards a Unified Approach to Access Control and Concurrency Control. This is Mark Miller's PhD disseration, and it explains the rationale, philosophy, and goals of E and related systems.
Safe Serialization Under Mutual Suspicion (Wiki conversion in progress)
Tutorials
Tutorials - several short tutorials showing how to use E.
Quick Reference Card - Reminders of some useful patterns.
Papers
Capability-based Financial Instruments "An Ode to the Granovetter Diagram" - diagramming communication relationships.
Paradigm Regained: Abstraction Mechanisms for Access Control
Concurrency Among Strangers: Programming in E as Plan Coordination - by Mark S. Miller, E. Dean Tribble, Jonathan Shapiro. Explains E's concurrency control & distributed computing model.
Authority Analysis for Least Privilege Environments by Toby Murray and Gavin Lowe.
Talks and Presentations
The Lively Kernel by Dan Ingalls
Object-Capabilities for Security by David Wagner
Gears and the Mashup Problem by Douglas Crockford
Desktops to Donuts: Object-Caps Across Scales by Marc Stiegler
Core Patterns for Web Permissions by Tyler Close
Paradigm Regained: Abstraction Mechanisms for Access Control by Mark Miller
The Virus Safe Computing Initiative at HP Labs by Alan Karp