On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks