This HTML5 document contains 113 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n41http://dbpedia.org/resource/Handle_(computing)
n30http://portal.acm.org/citation.cfm?id=850709&dl=ACM&coll=&CFID=15151515&CFTOKEN=
n52http://dbpedia.org/resource/Object_(computer_science)
wikipedia-enhttp://en.wikipedia.org/wiki/
n54http://dbpedia.org/resource/Hydra_(operating_system)
n44http://srl.cs.jhu.edu/pubs/SRL2003-02.
dbrhttp://dbpedia.org/resource/
n43http://www.eros-os.org/
n24http://dbpedia.org/resource/System/
n38http://www.erights.org/
n37http://portal.acm.org/citation.cfm?id=850701&coll=&dl=ACM&CFID=15151515&CFTOKEN=
n21http://dbpedia.org/resource/C.
n31http://portal.acm.org/citation.cfm?id=361070&dl=ACM&coll=&CFID=15151515&CFTOKEN=
n46http://www.cap-lore.com/CapTheory/index.
n32http://portal.acm.org/citation.cfm?id=538134&dl=ACM&coll=&CFID=15151515&CFTOKEN=
dcthttp://purl.org/dc/terms/
n16http://dbpedia.org/resource/Kernel_(computer_science)
n28http://dbpedia.org/resource/Amoeba_(operating_system)
rdfshttp://www.w3.org/2000/01/rdf-schema#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
dbphttp://dbpedia.org/property/
xsdhhttp://www.w3.org/2001/XMLSchema#
n47http://dbpedia.org/resource/AS/
n55http://dbpedia.org/resource/Capability_(computer_science)
dbohttp://dbpedia.org/ontology/
dbpedia-wikidatahttp://wikidata.dbpedia.org/resource/
n29http://www.friedhoff.org/posixfilecaps.
dbpedia-jahttp://ja.dbpedia.org/resource/
n12http://doi.ieeecomputersociety.org/10.1109/SECPRI.1989.
dbchttp://dbpedia.org/resource/Category:
n39http://www.eros-os.org/essays/capintro.
n20http://en.wikipedia.org/wiki/Capability-based_security?oldid=
n36http://portal.acm.org/citation.cfm?id=801885&dl=ACM&coll=&CFID=15151515&CFTOKEN=
n9http://dbpedia.org/resource/Privilege_(computer_science)
n48http://www.cs.washington.edu/homes/levy/capabook/Chapter5.
n33http://portal.acm.org/citation.cfm?id=319163&dl=ACM&coll=&CFID=15151515&CFTOKEN=
yagohttp://dbpedia.org/class/yago/
n17http://rdf.freebase.com/ns/m.
wikidatahttp://www.wikidata.org/entity/
n40http://www.eros-os.org/pipermail/cap-talk/2003-March/001133.
n8http://purl.org/linguistics/gold/
yago-reshttp://yago-knowledge.org/resource/
n7http://purl.org/voc/vrank#
n34http://portal.acm.org/citation.cfm?id=356682&coll=&dl=ACM&CFID=15151515&CFTOKEN=
n10http://dbpedia.org/resource/Reference_(computer_science)
dbpedia-ithttp://it.dbpedia.org/resource/
n18http://www.sevagas.com/?
n4http://www.linuxjournal.com/magazine/
provhttp://www.w3.org/ns/prov#
foafhttp://xmlns.com/foaf/0.1/
n51http://dbpedia.org/resource/Path_(computing)
n35http://www.ibm.com/developerworks/library/l-posixcap/
n49http://dbpedia.org/resource/User_(computing)
n45http://www.cs.washington.edu/homes/levy/capabook/
n6http://dbpedia.org/resource/Ring_(computer_security)
owlhttp://www.w3.org/2002/07/owl#
Subject Item
dbr:Capability-based_security
rdf:type
yago:WikicatComputerSecurityModels yago:Worker109632518 yago:Whole100003553 yago:Model110324560 yago:Assistant109815790 yago:YagoLegalActor yago:YagoLegalActorGeo yago:Object100002684 yago:CausalAgent100007347 yago:Person100007846 yago:LivingThing100004258 yago:Organism100004475 yago:PhysicalEntity100001930
rdfs:label
Capability Capability-based security Capability-based security
rdfs:comment
Capability-based security は、セキュリティの高い(セキュアな)コンピュータを設計するためのコンセプトの一つである。 Capability-based security is a concept in the design of secure computing systems, one of the existing security models. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights. A user program on a capability-based operating system must use a capability to access an object. Capability-based security refers to the principle of designing user programs such that they directly share capabilities with each other according to the principle of least privilege, and to the operating system infrastructure necessary to make such transactions efficient and secure. Capability-based security is to be contrasted with an approach that uses hierarchical protection domains. Con il termine capability si intende in informatica un meccanismo di protezione delle risorse orientato agli oggetti complementare alle ACL. I sistemi che utilizzano le capability associano a ciascun processo una lista di capability (o C-list), che descrive per l'appunto a quali oggetti (per esempio file) il processo può accedere. Una C-list può essere formata da dei nodi, ciascuno dei quali rappresenta i permessi su un determinato oggetto puntato.
owl:sameAs
wikidata:Q1094291 yago-res:Capability-based_security n17:02n10l dbpedia-it:Capability dbpedia-ja:Capability-based_security dbpedia-wikidata:Q1094291
dct:subject
dbc:Access_control dbc:Capability_systems dbc:Computer_security_models
dbo:wikiPageID
539717
dbo:wikiPageRevisionID
735189902
dbo:wikiPageWikiLink
dbr:Computer_security dbr:Extremely_Reliable_Operating_System dbr:Access_Control_List n6: n9: dbr:Computer_security_model dbr:L4_microkernel_family n10: dbr:Google_Fuchsia dbr:Ten15 dbr:Plessey_System_250 dbr:Coyotos n16: dbr:ACM_Computing_Surveys dbr:Access_token dbr:GNOSIS dbr:CapROS dbr:Computer_program dbr:Tahoe-LAFS dbr:Serialization dbr:File_descriptor dbr:Data_structure n21:mmp n24:38 dbr:Cambridge_CAP_computer dbc:Access_control n28: dbr:Principle_of_least_privilege dbr:Flex_machine dbr:Confused_deputy_problem dbr:KeyKOS dbc:Capability_systems dbr:Access_control dbr:Access_control_list dbc:Computer_security_models n41: dbr:POSIX dbr:CloudABI dbr:Orthogonal_persistence dbr:Intel_iAPX_432 n47:400 dbr:Plessey_250 dbr:Security_hole n49: dbr:Carnegie_Mellon_University n51: dbr:Capability-based_addressing n52: dbr:E_programming_language dbr:Operating_system n54: n55: dbr:Ambient_authority
dbo:wikiPageExternalLink
n4:making-root-unprivileged n12:36277 n18:POSIX-file-capabilities-the-dark n29:html n30:6184618 n31:6184618 n32:6184618 n33:6184618 n34:6184618 n35: n36:6184618 n37:6184618 n38: n39:html n40:html n43: n44:pdf n45: n46:html n48:pdf
foaf:isPrimaryTopicOf
wikipedia-en:Capability-based_security
prov:wasDerivedFrom
n20:735189902
dbo:abstract
Capability-based security は、セキュリティの高い(セキュアな)コンピュータを設計するためのコンセプトの一つである。 Capability-based security is a concept in the design of secure computing systems, one of the existing security models. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights. A user program on a capability-based operating system must use a capability to access an object. Capability-based security refers to the principle of designing user programs such that they directly share capabilities with each other according to the principle of least privilege, and to the operating system infrastructure necessary to make such transactions efficient and secure. Capability-based security is to be contrasted with an approach that uses hierarchical protection domains. Although most operating systems implement a facility which resembles capabilities, they typically do not provide enough support to allow for the exchange of capabilities among possibly mutually untrusting entities to be the primary means of granting and distributing access rights throughout the system. A capability-based system, in contrast, is designed with that goal in mind. Capabilities as discussed in this article should not be confused with POSIX 1e/2c "". The latter are coarse-grained privileges that cannot be transferred between processes. Con il termine capability si intende in informatica un meccanismo di protezione delle risorse orientato agli oggetti complementare alle ACL. I sistemi che utilizzano le capability associano a ciascun processo una lista di capability (o C-list), che descrive per l'appunto a quali oggetti (per esempio file) il processo può accedere. Una C-list può essere formata da dei nodi, ciascuno dei quali rappresenta i permessi su un determinato oggetto puntato.
dbp:date
April 2014
dbp:reason
very abstractly worded, using same word to describe itself, confusing
n7:hasRank
_:vb27415358
n8:hypernym
dbr:Concept
Subject Item
_:vb27415358
n7:rankValue
6.83996