How does one make a program breach resistant?One promising approach is to apply the Principle of Least Authority at
object granularity. The E language has previously demonstrated that object-capability languages turn many of the security
requirements for software into emergent properties of traditional object-oriented design and modularity enforcement.
Emily is a subset of OCaml that uses a design rule verifier to enforce object-capability principles. It demonstrates how
memory-safe languages can be transformed into breach-resistant object-capability systems with little loss of either
expressivity or performance.
%0 Generic
%1 noauthororeditor
%A Marc, Stiegler
%A Mark, Miller
%D 2006
%K capability_security
%T How Emily Tamed the Caml
%U https://www.hpl.hp.com/techreports/2006/HPL-2006-116.pdf
%X How does one make a program breach resistant?One promising approach is to apply the Principle of Least Authority at
object granularity. The E language has previously demonstrated that object-capability languages turn many of the security
requirements for software into emergent properties of traditional object-oriented design and modularity enforcement.
Emily is a subset of OCaml that uses a design rule verifier to enforce object-capability principles. It demonstrates how
memory-safe languages can be transformed into breach-resistant object-capability systems with little loss of either
expressivity or performance.
@electronic{noauthororeditor,
abstract = {How does one make a program breach resistant?One promising approach is to apply the Principle of Least Authority at
object granularity. The E language has previously demonstrated that object-capability languages turn many of the security
requirements for software into emergent properties of traditional object-oriented design and modularity enforcement.
Emily is a subset of OCaml that uses a design rule verifier to enforce object-capability principles. It demonstrates how
memory-safe languages can be transformed into breach-resistant object-capability systems with little loss of either
expressivity or performance.},
added-at = {2023-07-10T13:39:07.000+0200},
author = {Marc, Stiegler and Mark, Miller},
biburl = {https://www.bibsonomy.org/bibtex/26237c6519405e39fb95bb545ce8ed7fc/ccx},
interhash = {ca50d2b7e0874bc581abc75b7b3cb0b0},
intrahash = {6237c6519405e39fb95bb545ce8ed7fc},
keywords = {capability_security},
language = {English},
timestamp = {2023-07-10T13:39:07.000+0200},
title = {How Emily Tamed the Caml},
url = {https://www.hpl.hp.com/techreports/2006/HPL-2006-116.pdf},
year = 2006
}