Jump to content

Talk:Object-capability model

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Erights (talk | contribs) at 04:46, 6 July 2009. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputer security: Computing Unassessed
WikiProject iconThis article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
Things you can help WikiProject Computer security with:
Article alerts are available, updated by AAlertBot. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconComputing Unassessed
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.

A request from Mark Miller (erights):

  • This article has suffered some from reversion wars, where some anonymous contributors revert some editorial revisions of other anonymous contributors, back and forth. I have done this myself. So that discussion can replace further reversion wars, I ask that all potentially controversial edits to this article be done after logging in, so disagreements can be more directly discussed. Hereafter, I will do so as well.
  • Question: Is there any way to put a wikipedia article into a state where such login is required in order to edit?

To do:

  • Add etymology to introduction [done 2007-01-06T22:38]
    • The name comes from recognition of the fact that "pure" object-oriented programming constitutes the capability-based security model. [done 2007-01-06T22:38]
    • Touted advantages of objects (encapsulation, modularity) are precisely what we want for security (privilege separation, least privilege). [done 2007-01-06T22:38]
  • Section: Advantages of object-capabilities
    • No such thing as ambient authority (explain what that is)
    • Only connectivity begets connectivity
    • Show the Granovetter diagram!
    • No fixed set of operations (read, write, etc.); everything is invocation
    • Section: Combining designation and authority
      • Solving Confused Deputy
  • Section: Relationship to object-oriented programming
    • references are called "pointers" Pointers often imply pointer artimetric which is forbidden in object capabilities systems. Also Java documentation uses the word reference instead of pointer --Zarutian (talk) 03:20, 10 September 2008 (UTC)[reply]
  • Section: Relationship to capability-based security
    • references are called "capabilities"
    • the term "capability"
    • object-capabilities versus password capabilities
    • explain distinctions as in Capability Myths Demolished
  • Possible section: relationship to lambda calculus?

Ka-Ping Yee 08:26, 6 January 2007 (UTC)[reply]

A few additional topics

  • Synergy (can + can opener => contents)
  • sealers/unsealers
  • factory pattern
  • membrane pattern (probably doesn't belong on front page) Would require introduction to revocable forwarders --Zarutian (talk) 03:24, 10 September 2008 (UTC)[reply]
  • other systems to mention:
    • Joule [added 2007-01-06T22:38]
    • KeyKOS [added 2007-01-06T22:38]
    • Coyotos

Dean Tribble 18:47, 6 January 2007 (UTC)[reply]

Concrete example

So far this page is pretty abstract. I think the first subsection after the introduction should give a practical example. — Ka-Ping Yee 23:59, 6 January 2007 (UTC)[reply]