From Erights

(Difference between revisions)
Jump to: navigation, search
(Split Papers into subsections)
Line 41: Line 41:
[ Access Control] by Ben Laurie.
[ Access Control] by Ben Laurie.
=== Concurrency Control ===
=== Concurrency Control ===

Revision as of 16:52, 27 April 2010


Books and Theses

Patterns of Safe Collaboration

Object-Capability Security in Virtual Environments

Image:Ewalnut-pink.gif E in a Walnut - This is a basic tutorial on the E language covering basic, distributed, and secure distributed programming.

Robust Composition - Towards a Unified Approach to Access Control and Concurrency Control. This is Mark Miller's PhD disseration, and it explains the rationale, philosophy, and goals of E and related systems.

Safe Serialization Under Mutual Suspicion (Wiki conversion in progress)


Tutorials - several short tutorials showing how to use E.

Quick Reference Card - Reminders of some useful patterns.


E Under Eclipse


Access Control

Capability Myths Demolished by Mark S. Miller, Ka-Ping Yee, and Jonathan Shapiro. What you may have learned in CS class is wrong.

Capability-based Financial Instruments "An Ode to the Granovetter Diagram" - diagramming communication relationships.

Authority Analysis for Least Privilege Environments by Toby Murray and Gavin Lowe.

Non-delegatable authorities in capability systems by Toby Murray and Gavin Lowe. (ACM link)

MinorFs by Rob Meijer. The MinorFs user-space filesystems works with AppArmor to provide a flexible form of discretionary access control.

Mashing with Permission by Tyler Close.

ACLs don't by Tyler Close.

Access Control by Ben Laurie.

Concurrency Control

Concurrency Among Strangers: Programming in E as Plan Coordination - by Mark S. Miller, E. Dean Tribble, Jonathan Shapiro. Explains E's concurrency control & distributed computing model.

Causeway: A message-oriented distributed debugger by Terry Stanley, Tyler Close, and Mark S. Miller.

User Interface

Not One Click for Security by Alan Karp, Marc Stiegler, and Tyler Close. Describes how the ScoopFS (secure cooperative file sharing) UI design avoids ever presenting the user any interaction whose only purpose is security.

User Interaction Design for Secure Systems by Ka-Ping Yee.

Rich Sharing for the Web by Marc Stiegler. What properties must computer-based human-to-human sharing mechanisms need to support, so that people don't just send email attachments instead?

Talks and Presentations

Secure Collaboration - How Web Applications can Share and Still Be Paranoid by Mike Samuel

Tradeoffs in Retrofitting Security: An Experience Report by Mark Miller

Google TechTalk: Caja by Mike Samuel

The Lively Kernel by Dan Ingalls

Object-Capabilities for Security by David Wagner (slides from an earlier version of this talk)

Gears and the Mashup Problem by Douglas Crockford

Desktops to Donuts: Object-Caps Across Scales by Marc Stiegler

Core Patterns for Web Permissions by Tyler Close

Paradigm Regained: Abstraction Mechanisms for Access Control by Mark Miller

The Virus Safe Computing Initiative at HP Labs by Alan Karp

Important emails

On the Spread of the Capability Approach by Bill Tulloh

Personal tools
more tools