On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks | IEEE Conference Publication | IEEE Xplore