ERights Home elib 
No Previous Sibling 1st child: Overview: Capability Computation On to: Concurrency in E

Capability Computation
A Capability combines Designation with Authority. -- Norm Hardy


Capability Security Overview E's Capabilities are object references that can span machines and persist, while still being unforgeable.
Granovetter diagram 3 Parts of Security: If computer security is the answer, what's the question?
Intro to Capabilities: Gentle but compelling
Animating flame The Ode: From lambda calculus, through capabilities, to smart contracts. Presented at Financial Cryptography 2000.
Capabilities by Sound Bytes: Bytes of wisdom from the master of modern capability theory.
Matching Grants In Capability Myths Demolished, we set the record straight.

Confinement

The Factory

Distributed
Confinement

The Delegation Matrix: Corrects a tragic misunderstanding, and more.
Statement of Consensus: Heated email argument leads to surprisingly many points of agreement.
Zooko's Triangle The Grant Matcher finally clarifies the meaning of distributed equality in a mutually suspicious world.
The PetName Markup Language creates a name space humans can use securely, so they can play too.
The Dead Man Switch provides remote revocability despite partial failure.
 
Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain.
ERights Home elib 
No Previous Sibling 1st child: Overview: Capability Computation On to: Concurrency in E
Download    FAQ    API    Mail Archive    Donate

report bug (including invalid html)

Golden Key Campaign Blue Ribbon Campaign