[Cartwright91] Robert Cartwright, Mike Fagan, "Soft Typing", Proceedings of the SIGPLAN '91 Conference on Programming Language Design and Implementation. http://citeseer.nj.nec.com/cartwright91soft.html
[Church41] Alonzo Church, "The Calculi of Lambda Conversion ", Annals of Mathematical Studies no. 6. Princeton University Press (Princeton, 1941). Reprinted by Klaus Reprint Corp. (New York, 1965). First three pages online at http://users.bestweb.net/~sowa/logic/alonzo.htm.
[Close99] Tyler Close, "Droplet Security", 1999, http://www.waterken.com/Droplet/security.html
[Dennis66] Dennis and E. Van Horn, "Programming semantics for multiprogrammed computations," CACM, vol. 9, pp. 143155, Mar. 1966. (I-B5, II-B1, II-E). http://citeseer.nj.nec.com/dennis65programming.html.
[Donnelley76] Jed E. Donnelley, "A Distributed Capability Computing System" Third International Conference on Computer Communication, Toronto, Canada, 1976. http://www.nersc.gov/~jed/papers/DCCS/
[Donnelley81] Jed E. Donnelley, "Managing Domains in a Network Operating System" (1981) Proceedings of the Conference on Local Networks and Distributed Office Systems, Online, pp. 345-361. http://www.nersc.gov/~jed/papers/Managing-Domains/
[Doorn96] Leendert van Doorn, Martin Abadi, Michael Burrows, and Edward P. Wobber. "Secure Network Objects" in Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 211-221. IEEE Computer Society, May 1996 ftp://ftp.digital.com/pub/DEC/SRC/publications/wobber/sno.ps
[Ellison99] Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, B. Thomas, and T. Ylonen, "SPKI Certificate Theory" IETF RFC 2693. http://www.ietf.org/rfc/rfc2693.txt
[Goldberg76] Edited by Adele Goldberg and Alan Kay "Smalltalk 72 Instruction Manual", Xerox PARC, March 1976. Online at http://www.spies.com/~aek/pdf/xerox/alto/Smalltalk72_Manual.pdf.
[Gosling96] James Gosling, Bill Joy, Guy Steele, Chapter 6.6 "Access Control" of "The Java Language Specification", Addison-Wesley, 1996. http://java.sun.com/docs/books/jls/second_edition/html/names.doc.html#104285.
[Granovetter73] Mark Granovetter, "The Strength of Weak Ties", in: American Journal of Sociology (1973) Vol. 78, pp.1360-1380. Online at https://www.cypherpunks.to/erights/history/weak-ties.pdf.
[Hardy] Norm Hardy, "Synergy, Rights Amplification, Sibling Communication, and Sealing", http://cap-lore.com/CapTheory/Synergy.html
[Hardy85] Norm Hardy, "The KeyKOS Architecture", Operating Systems Review, September 1985, pp. 8-25. Updated at http://www.cis.upenn.edu/~KeyKOS/OSRpaper.html
[Hardy88] Norm Hardy, "The Confused Deputy, or why capabilities might have been invented", Operating Systems Review, pp. 36:38, Oct., 1988, http://cap-lore.com/CapTheory/ConfusedDeputy.html
[Hewitt73] Carl Hewitt, Peter Bishop, Richard Stieger, "A Universal Modular Actor Formalism for Artificial Intelligence", Proceedings of the 1973 International Joint Conference on Artificial Intelligence, pp. 235-246.
[MacKenzie99] Philip MacKenzie and Jeffrey Sorensen, "Anonymous Investing: Hiding the Identities of Stockholders", Matthew Franklin, ed., Financial Cryptography, Proceedings of the Third International Conference, 1999, Springer Lecture Notes in Computer Science, 1648. http://citeseer.nj.nec.com/mackenzie99anonymous.html.
[Miller99] Mark S. Miller, "Inheritance By Static Delegation", http://www.erights.org/elang/blocks/inheritance.html, 1999.
[Morris73] James H. Morris, "Protection in Programming Languages", CACM 16(1):15-21, 1973. Online at http://www.erights.org/history/morris73.pdf.
[Parnas72] David Parnas, "On the Criteria To Be Used in Decomposing Systems into Modules", CACM, vol 15, num. 12, Dec. 1972. http://www.acm.org/classics/may96/.
[Rees96] Jonathan Rees, "A Security Kernel Based on the Lambda-Calculus", (MIT, Cambridge, MA, 1996) MIT AI Memo No. 1564. http://mumble.net/jar/pubs/secureos/
[Rivest77] Ronald L. Rivest, Adi Shamir, Len Adelman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," MIT LCS Technical Memorandum 82 (Revised August 1977) at 10. http://theory.lcs.mit.edu/~cis/pubs/rivest/rsapaper.ps
[Saltzer75] Jerome H. Saltzer, Michael D. Schroeder, "The Protection of Information in Computer Systems", Proceedings of the IEEE. Vol. 63, No. 9 (September 1975), pp. 1278-1308. http://cap-lore.com/CapTheory/ProtInf/
[Schneier96] Bruce Schneier, "Why Cryptography Is Harder Than It Looks", Counterpane Systems, 1996, http://www.counterpane.com/whycrypto.html
[Shalit96] Andrew Shalit, "The Dylan Reference Manual: The Definitive Guide to the New Object-Oriented Dynamic Language", Addison Wesley, 1996, chapter on Modules http://www.gwydiondylan.org/drm/drm_26.htm
[Shannon48] Claude E. Shannon, ``A Mathematical Theory of Communication,'' Bell System Technical Journal, vol. 27, pp. 379-423 and 623-656, July and October, 1948. http://cm.bell-labs.com/cm/ms/what/shannonday/shannon1948.pdf
[Shapiro99] Jonathan S. Shapiro, "EROS: A Capability System", Ph.D. thesis, University of Pennsylvania, 1999. http://www.eros-os.org/papers/shap-thesis.ps.
[Szabo97] Nick Szabo, "Formalizing and Securing Relationships on Public Networks", First Monday, vol 2 no 9, updated copy at http://szabo.best.vwh.net/formalize.html
[Tanenbaum86] Andrew S. Tanenbaum, Sape J. Mullender, Robbert van Renesse, "Using Sparse Capabilities in a Distributed Operating System" (1986) Proc. Sixth Int'l Conf. On Distributed Computing Systems, IEEE, pp. 558-563. ftp://ftp.cs.vu.nl/pub/papers/amoeba/dcs86.ps.Z.
[Tribble95] Eric Dean Tribble, Mark S. Miller, Norm Hardy, Dave Krieger, "Joule: Distributed Application Foundations", http://www.erights.org/history/joule/, 1995.
[Wollrath99] Ann Wollrath and Jim Waldo, "Trail: RMI" in "The Java Tutorial, http://java.sun.com/docs/books/tutorial/rmi/index.html, 1999.
[Wulf74] William Wulf et al, "HYDRA: The kernel of a multiprocessor operating system," CACM, vol. 17, pp. 337-345, June 1974. (I-A2, II-B3, III-A). Online at http://www.cs.princeton.edu/~rywang/02f518/papers/hydra.pdf. (See also http://www.cs.washington.edu/homes/levy/capabook/Chapter6.pdf for an overview.)
Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain.