diff --git a/src/syndicated-actor-model.md b/src/syndicated-actor-model.md
index 46ea474..40b7f96 100644
--- a/src/syndicated-actor-model.md
+++ b/src/syndicated-actor-model.md
@@ -348,10 +348,10 @@ instance. The client remains blissfully unaware that anything untoward happened.
## Object-capabilities for access control
[Object capabilities](https://en.wikipedia.org/wiki/Object-capability_model) are the only
-properly compositional way to secure a distributed system. They are a natural fit for
-Actor-style systems, as demonstrated by E and its various descendants [[Miller 2006][], [Van
-Cutsem et al 2007][], [Stiegler and Tie 2010][], [Yoo et al 2012][] and others], so it makes sense
-that they would work well for the Syndicated Actor Model.
+properly compositional way to secure a distributed system.[^justification-and-examples] They
+are a natural fit for Actor-style systems, as demonstrated by E and its various descendants
+[[Miller 2006][], [Van Cutsem et al 2007][], [Stiegler and Tie 2010][], [Yoo et al 2012][] and
+others], so it makes sense that they would work well for the Syndicated Actor Model.
The main difference between SAM capabilities and those in E-style Actor models is that
syndicated capabilities express pattern-matching-based restrictions on the *assertions* that
@@ -434,6 +434,11 @@ in Linda.” ACM TOPLAS 7, no. 1 (January 2, 1985): 80–112.
Carriero. “Coordination Languages and Their Significance.” Communications of the ACM 35, no. 2
(February 1, 1992): 97–107. [[DOI]](https://doi.org/10.1145/129630.129635)
+[Karp 2015]: #ref:karp-2015
+[**Karp 2015**] Karp, Alan H. “Access Control for IoT: A Position
+Paper.” In IEEE Workshop on Security and Privacy for IoT. Washington, DC, USA, 2015.
+[[PDF]](https://alanhkarp.com/publications/Access-Control-for-IoT.pdf)
+
[Konieczny et al 2009]: #ref:konieczny-2009
[**Konieczny et al 2009**] Konieczny, Eric, Ryan Ashcraft, David
Cunningham, and Sandeep Maripuri. “Establishing Presence within the Service-Oriented
@@ -498,3 +503,8 @@ USENIX Annual Technical Conference. Boston, Massachusetts, 2012.
[^background-on-interests]: For more on assertions of interest, see
[here](https://syndicate-lang.org/about/#conversational-frames-conversational-knowledge) and
[here](https://syndicate-lang.org/tonyg-dissertation/html/#x_2_2_0_0_8).
+
+[^justification-and-examples]: Karp [[2015][Karp 2015]] offers a good justification of this
+ claim along with a worked example of object-capabilities in a personal-computing setting.
+ The capabilities are ordinary E-style capabilities rather than SAM-style capabilities, but
+ the conclusions hold.