Documentation
From Erights
(→Books and Theses: fix title) |
(→Papers: added causeway) |
||
Line 29: | Line 29: | ||
[http://web.comlab.ox.ac.uk/oucl/work/toby.murray/papers/AALPE.pdf Authority Analysis for Least Privilege Environments] by Toby Murray and Gavin Lowe. | [http://web.comlab.ox.ac.uk/oucl/work/toby.murray/papers/AALPE.pdf Authority Analysis for Least Privilege Environments] by Toby Murray and Gavin Lowe. | ||
+ | |||
+ | [http://www.erights.org/elang/tools/causeway/causeway-paper.pdf Causeway: A message-oriented distributed debugger] by Terry Stanley, E. Dean Tribble, and Mark S. Miller. | ||
== Talks and Presentations == | == Talks and Presentations == |
Revision as of 16:51, 18 February 2008
Contents |
Books and Theses
Patterns of Safe Collaboration
Object-Capability Security in Virtual Environments
E in a Walnut - This is a basic tutorial on the E language covering basic, distributed, and secure distributed programming.
Robust Composition - Towards a Unified Approach to Access Control and Concurrency Control. This is Mark Miller's PhD disseration, and it explains the rationale, philosophy, and goals of E and related systems.
Safe Serialization Under Mutual Suspicion (Wiki conversion in progress)
Tutorials
Tutorials - several short tutorials showing how to use E.
Quick Reference Card - Reminders of some useful patterns.
Papers
Capability-based Financial Instruments "An Ode to the Granovetter Diagram" - diagramming communication relationships.
Paradigm Regained: Abstraction Mechanisms for Access Control
Concurrency Among Strangers: Programming in E as Plan Coordination - by Mark S. Miller, E. Dean Tribble, Jonathan Shapiro. Explains E's concurrency control & distributed computing model.
Authority Analysis for Least Privilege Environments by Toby Murray and Gavin Lowe.
Causeway: A message-oriented distributed debugger by Terry Stanley, E. Dean Tribble, and Mark S. Miller.
Talks and Presentations
The Lively Kernel by Dan Ingalls
Object-Capabilities for Security by David Wagner
Gears and the Mashup Problem by Douglas Crockford
Desktops to Donuts: Object-Caps Across Scales by Marc Stiegler
Core Patterns for Web Permissions by Tyler Close
Paradigm Regained: Abstraction Mechanisms for Access Control by Mark Miller
The Virus Safe Computing Initiative at HP Labs by Alan Karp