This HTML5 document contains 37 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n11https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbchttp://dbpedia.org/resource/Category:
dbphttp://dbpedia.org/property/
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Capsicum_(Unix)
rdfs:label
Capsicum (Unix)
rdfs:comment
Capsicum is an implementation of capability-based security for UNIX and similar systems. Presented at USENIX 2010, the system is part of FreeBSD since its 9.0 release. It has also been adapted to Linux and DragonflyBSD in the form of kernel patches.
dcterms:subject
dbc:Computer_security_models dbc:Capability_systems dbc:Access_control
dbo:wikiPageID
63602390
dbo:wikiPageRevisionID
1026880441
dbo:wikiPageWikiLink
dbr:WebAssembly dbc:Access_control dbr:USENIX dbr:DragonflyBSD dbc:Computer_security_models dbr:Unix-like dbc:Capability_systems dbr:Flag_(computing) dbr:Linux dbr:Capability-based_security dbr:UNIX dbr:FreeBSD dbr:Application_binary_interface dbr:POSIX dbr:File_system dbr:System_call dbr:Unix_socket dbr:File_descriptor dbr:Instruction_set_architecture dbr:Patch_(computing)
owl:sameAs
n11:BurFy wikidata:Q96374408
dbp:wikiPageUsesTemplate
dbt:Reflist dbt:Man dbt:As_of dbt:Object-capability_security
dbo:abstract
Capsicum is an implementation of capability-based security for UNIX and similar systems. Presented at USENIX 2010, the system is part of FreeBSD since its 9.0 release. It has also been adapted to Linux and DragonflyBSD in the form of kernel patches. The system works by chunking the normal permissions up into very small pieces. When a process enters capsicum mode, it loses all permissions normally associated with its controlling user, with the exception of "capabilities" it already has in the form of file descriptors. A process can also receive capabilities via Unix sockets. These file descriptors not only control access to the file system, but also to other devices like the network sockets. Flags are also used to control more fine-grained access like reads and writes.
prov:wasDerivedFrom
wikipedia-en:Capsicum_(Unix)?oldid=1026880441&ns=0
dbo:wikiPageLength
2553
foaf:isPrimaryTopicOf
wikipedia-en:Capsicum_(Unix)