Concept

Capability-based security

Related publications (8)

Stoic: Towards Disciplined Capabilities

Martin Odersky, Nada Amin, Fengyun Liu, Sandro Stucki, Paolo Giosuè Giarrusso

Capabilities are widely used in the design of software systems to ensure security. A system of capabilities can become a mess in the presence of objects and functions: objects may leak capabilities and functions may capture capabilities. They make reasonin ...
2020

Clever Arbiters Versus Malicious Adversaries

Serge Vaudenay

When moving from known-input security to chosen-input security, some generic attacks sometimes become possible and must be discarded by a specific set of rules in the threat model. Similarly, common practices consist of fixing security systems, once an exp ...
Springer Berlin Heidelberg2016

Energy-Efficient Co-Design Optimization of Many-Core Platforms for Big-Data Streaming Applications

Karim Kanoun

Big-Data streaming applications are used in several domains such as social media analysis, financial analysis, video annotation, surveillance, medical services and traffic prediction. These applications, running on different types of platforms from mobile ...
EPFL2015

Faster and Smoother - VSH Revisited

Juraj Sarinay

We reconsider the provably collision resistant Very Smooth Hash and propose a small change in the design aiming to improve both performance and security. While the original proofs of security based on hardness of factoring or discrete logarithms are preser ...
Springer-Verlag New York, Ms Ingrid Cunningham, 175 Fifth Ave, New York, Ny 10010 Usa2011

A Message Recognition Protocol Based on Standard Assumptions

Serge Vaudenay, Atefeh Mashatan

We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the random oracle model or are based on non-standard assumptions. Incorporating ran ...
Springer2010

Modeling Nucleation and Growth of Zinc Grains in Hot-Dip Galvanized Coatings

Michel Rappaz, Aurèle Mariaux

Hot-dip galvanized Zn-0.2wt%Al coatings on steel sheets exhibit a strong basal texture ({0001} parallel to the sheet plane). Part of this texture call be explained by the faster growth of < 10 (1) over bar0 > dendrites as compared with < 0001 >, granting b ...
Minerals, Metals & Materials Soc, 184 Thorn Hill Rd, Warrendale, Pa 15086-7514 Usa2009

Run-time Support for Distributed Object Sharing in Safe Programming Languages

Willy Zwaenepoel

We present a new run-time system that supports object sharing in a distributed system. The key insight in this system is that a handle-based implementation of such a system enables effcient and transparent sharing of data with both fine-grained and coarse- ...
2003

Multi Modal Verification for Teleservices and Security Applications

Peter Ryser, Eric Meurville, Yousri Abdeljaoued, Remo Heimgartner

The paper presents the European ACTS project “M2VTS” which stands for Multi Modal Verification for Teleservices and Security Applications. The primary goal of this project is to address the issue of secured access to local and centralised services in a mul ...
1999

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.