ERights Home elib / capability / ode 
Back to: Acknowledgements No Next Sibling

Capability-based Financial Instruments
References


[Bodnar87] George H. Bodnar and William S. Hopwood, "Accounting Information Systems", 3rd ed. Boston: Allyn and Bacon, 1987.

[Cartwright91] Robert Cartwright, Mike Fagan, "Soft Typing", Proceedings of the SIGPLAN '91 Conference on Programming Language Design and Implementation. http://citeseer.nj.nec.com/cartwright91soft.html

[Chaum82] David Chaum, "Blind Signatures for Untraceable Payments," in Advances in Cryptology Proceedings of Crypto 82, D. Chaum, R.L. Rivest, & A.T. Sherman (Eds.), Plenum, pp. 199-203.

[Church41] Alonzo Church, "The Calculi of Lambda Conversion ", Annals of Mathematical Studies no. 6. Princeton University Press (Princeton, 1941). Reprinted by Klaus Reprint Corp. (New York, 1965). First three pages online at http://users.bestweb.net/~sowa/logic/alonzo.htm.

[Close99] Tyler Close, "Droplet Security", 1999, http://www.waterken.com/Droplet/security.html

[CORBA] http://www.omg.org/

[Crockford97] Douglas Crockford, personal communications.

[Dennis66] Dennis and E. Van Horn, "Programming semantics for multiprogrammed computations," CACM, vol. 9, pp. 143155, Mar. 1966. (I-B5, II-B1, II-E). http://citeseer.nj.nec.com/dennis65programming.html.

[Deutsch99] Peter Deutsch, personal communications.

[Donnelley76] Jed E. Donnelley, "A Distributed Capability Computing System" Third International Conference on Computer Communication, Toronto, Canada, 1976. http://www.nersc.gov/~jed/papers/DCCS/

[Donnelley81] Jed E. Donnelley, "Managing Domains in a Network Operating System" (1981) Proceedings of the Conference on Local Networks and Distributed Office Systems, Online, pp. 345-361. http://www.nersc.gov/~jed/papers/Managing-Domains/

[Doorn96] Leendert van Doorn, Martin Abadi, Michael Burrows, and Edward P. Wobber. "Secure Network Objects" in Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 211-221. IEEE Computer Society, May 1996 ftp://ftp.digital.com/pub/DEC/SRC/publications/wobber/sno.ps

[E] http://www.erights.org

[e-gold] http://www.e-gold.com/e-gold.asp?cid=101791

[Ellison99] Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, B. Thomas, and T. Ylonen, "SPKI Certificate Theory" IETF RFC 2693. http://www.ietf.org/rfc/rfc2693.txt

[Gamma95] Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, "Design Patterns: Elements of Reusable Object-Oriented Software" Addison-Wesley Professional Computing, 1995.

[Goldberg76] Edited by Adele Goldberg and Alan Kay "Smalltalk 72 Instruction Manual", Xerox PARC, March 1976. Online at http://www.spies.com/~aek/pdf/xerox/alto/Smalltalk72_Manual.pdf.

[Gosling96] James Gosling, Bill Joy, Guy Steele, Chapter 6.6 "Access Control" of "The Java Language Specification", Addison-Wesley, 1996. http://java.sun.com/docs/books/jls/second_edition/html/names.doc.html#104285.

[Granovetter73] Mark Granovetter, "The Strength of Weak Ties", in: American Journal of Sociology (1973) Vol. 78, pp.1360-1380. Online at https://www.cypherpunks.to/erights/history/weak-ties.pdf.

[Hardy] Norm Hardy, "Synergy, Rights Amplification, Sibling Communication, and Sealing", http://cap-lore.com/CapTheory/Synergy.html

[Hardy85] Norm Hardy, "The KeyKOS Architecture", Operating Systems Review, September 1985, pp. 8-25. Updated at http://www.cis.upenn.edu/~KeyKOS/OSRpaper.html

[Hardy88] Norm Hardy, "The Confused Deputy, or why capabilities might have been invented", Operating Systems Review, pp. 36:38, Oct., 1988, http://cap-lore.com/CapTheory/ConfusedDeputy.html

[Hewitt73] Carl Hewitt, Peter Bishop, Richard Stieger, "A Universal Modular Actor Formalism for Artificial Intelligence", Proceedings of the 1973 International Joint Conference on Artificial Intelligence, pp. 235-246.

[Kahn88] Kenneth Kahn, and Mark S. Miller, "Language Design and Open Systems", in, Bernardo Huberman (ed.), Ecology of Computation (Elsevier Science Publishers/North-Holland, 1988).

[Kay99] derived from remarks by Alan Kay, personal communications.

[MacKenzie99] Philip MacKenzie and Jeffrey Sorensen, "Anonymous Investing: Hiding the Identities of Stockholders", Matthew Franklin, ed., Financial Cryptography, Proceedings of the Third International Conference, 1999, Springer Lecture Notes in Computer Science, 1648. http://citeseer.nj.nec.com/mackenzie99anonymous.html.

[Miller87] Mark S. Miller, Daniel G. Bobrow, Eric Dean Tribble, and Jacob Levy, "Logical Secrets", in: Shapiro, Ehud, (ed.), Concurrent Prolog: Collected Papers (MIT Press, Cambridge, MA, 1987).

[Miller99] Mark S. Miller, "Inheritance By Static Delegation", http://www.erights.org/elang/blocks/inheritance.html, 1999.

[Morris73] James H. Morris, "Protection in Programming Languages", CACM 16(1):15-21, 1973. Online at http://www.erights.org/history/morris73.pdf.

[Parnas72] David Parnas, "On the Criteria To Be Used in Decomposing Systems into Modules", CACM, vol 15, num. 12, Dec. 1972. http://www.acm.org/classics/may96/.

[Rees96] Jonathan Rees, "A Security Kernel Based on the Lambda-Calculus", (MIT, Cambridge, MA, 1996) MIT AI Memo No. 1564. http://mumble.net/jar/pubs/secureos/

[Rivest77] Ronald L. Rivest, Adi Shamir, Len Adelman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," MIT LCS Technical Memorandum 82 (Revised August 1977) at 10. http://theory.lcs.mit.edu/~cis/pubs/rivest/rsapaper.ps

[Saltzer75] Jerome H. Saltzer, Michael D. Schroeder, "The Protection of Information in Computer Systems", Proceedings of the IEEE. Vol. 63, No. 9 (September 1975), pp. 1278-1308. http://cap-lore.com/CapTheory/ProtInf/

[Sansom86] Robert D. Sansom, D. P. Julian, Richard Rashid, "Extending a Capability Based System Into a Network Environment" (1986) Research sponsored by DOD, pp. 265-274.

[Schelling63] Thomas C. Schelling, "The Strategy of Conflict", Oxford University Press, New York, 1963

[Schneier96] Bruce Schneier, "Why Cryptography Is Harder Than It Looks", Counterpane Systems, 1996, http://www.counterpane.com/whycrypto.html

[Selgin88] George Selgin, "The Theory of Free Banking: Money Supply Under Competitive Note Issue", Rowman & Littlefield, 1988.

[Shalit96] Andrew Shalit, "The Dylan Reference Manual: The Definitive Guide to the New Object-Oriented Dynamic Language", Addison Wesley, 1996, chapter on Modules http://www.gwydiondylan.org/drm/drm_26.htm

[Shannon48] Claude E. Shannon, ``A Mathematical Theory of Communication,'' Bell System Technical Journal, vol. 27, pp. 379-423 and 623-656, July and October, 1948. http://cm.bell-labs.com/cm/ms/what/shannonday/shannon1948.pdf

[Shapiro99] Jonathan S. Shapiro, "EROS: A Capability System", Ph.D. thesis, University of Pennsylvania, 1999. http://www.eros-os.org/papers/shap-thesis.ps.

[Szabo97] Nick Szabo, "Formalizing and Securing Relationships on Public Networks", First Monday, vol 2 no 9, updated copy at http://szabo.best.vwh.net/formalize.html

[Tanenbaum86] Andrew S. Tanenbaum, Sape J. Mullender, Robbert van Renesse, "Using Sparse Capabilities in a Distributed Operating System" (1986) Proc. Sixth Int'l Conf. On Distributed Computing Systems, IEEE, pp. 558-563. ftp://ftp.cs.vu.nl/pub/papers/amoeba/dcs86.ps.Z.

[Tribble95] Eric Dean Tribble, Mark S. Miller, Norm Hardy, Dave Krieger, "Joule: Distributed Application Foundations", http://www.erights.org/history/joule/, 1995.

[Wollrath99] Ann Wollrath and Jim Waldo, "Trail: RMI" in "The Java Tutorial, http://java.sun.com/docs/books/tutorial/rmi/index.html, 1999.

[Wulf74] William Wulf et al, "HYDRA: The kernel of a multiprocessor operating system," CACM, vol. 17, pp. 337-345, June 1974. (I-A2, II-B3, III-A). Online at http://www.cs.princeton.edu/~rywang/02f518/papers/hydra.pdf. (See also http://www.cs.washington.edu/homes/levy/capabook/Chapter6.pdf for an overview.)

 
Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain.
ERights Home elib / capability / ode 
Back to: Acknowledgements No Next Sibling
Download    FAQ    API    Mail Archive    Donate

report bug (including invalid html)

Golden Key Campaign Blue Ribbon Campaign