A distributed operating system, Amoeba, that includes capabilities for naming and protecting objects is reported. In contrast to traditional centralized operating systems, in which capabilities are managed by the operating system kernel, in Amoeba all the capabilities are managed directly by user code. To prevent tampering, the capabilities are protected cryptographically. A variety of the issues involved is outlined, and four different ways of dealing with access rights are presented.
|Title of host publication||Proceedings of the 6th International Conference on Distributed Computing Systems|
|Number of pages||6|
|Publication status||Published - 1986|