Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,876,907 papers from all fields of science
Search
Sign In
Create Free Account
ACF2
Known as:
ACF
, Access Control Facility
, Advanced Control Facility
ACF2 (Access Control Facility) is a commercial, discretionary access control software security system developed for the MVS (z/OS), VSE (z/VSE) and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Commercial software
Discretionary access control
Endevor
ORVYL and WYLBUR
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Implementing One Time Password based security mechanism for securing personal health records in cloud
K. Ramesh
,
S. Ramesh
International Conference on Control…
2014
Corpus ID: 14799601
Personal Health Record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be…
Expand
2012
2012
Measurement and Analysis for Residual Warpage of Chip-on-Flex (COF) and Chip-in-Flex (CIF) Packages
J. Jang
,
Kyoung-Lim Suk
,
K. Paik
,
Soon-Bok Lee
IEEE Transactions on Components, Packaging, and…
2012
Corpus ID: 23177888
A flip-chip package using adhesive interconnection consists of materials which have different coefficients of thermal expansion…
Expand
1990
1990
AudES - An Expert System for Security Auditing
G. Tsudik
,
Rita C. Summers
Conference on Innovative Applications of…
1990
Corpus ID: 937326
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many…
Expand
1987
1987
On a property of the PARCOR coefficients of stationary processes having Gaussian-shaped acf
G. Jacovitti
,
G. Scarano
Proceedings of the IEEE
1987
Corpus ID: 23055836
The function e-x2has many well-known mathematical properties. Here it is shown that if a stationary process has a Gaussian-shaped…
Expand
1984
1984
Resource Access Control Facility (RACF), Version 1, Release 5.
H. Israel
,
S. Fountain
,
J. R. Monsein
,
T. Chen
,
R. T. Jordan
1984
Corpus ID: 60149156
Abstract : The security features of RACF/MVS were evaluated against the requirements specified by the DoD Trusted Computer System…
Expand
1984
1984
Serialization of SVP requests-a locking proposal for APL
Michael van der Meulen
APL Conference
1984
Corpus ID: 8704284
How does APL fit into the new wave of distributed systems and parallel processing? Thanks to shared variables, APL offers a…
Expand
1983
1983
Maximum entropy power spectrum estimation with uncertainty in correlation measurements
Jean-Pierre Schott
,
J. McClellan
IEEE International Conference on Acoustics…
1983
Corpus ID: 19579778
The purpose of this paper is to present a multidimensional MEM algorithm, valid for nonuniformly sampled arrays, which satisfies…
Expand
1979
1979
Access Control in Parallel Programs
J. McGraw
,
G. Andrews
IEEE Transactions on Software Engineering
1979
Corpus ID: 16655657
An important component of a programming language for writing operating systems, or other large parallel systems, is the set of…
Expand
Highly Cited
1976
Highly Cited
1976
A Language Extension for Controlling Access to Shared Data
Anita K. Jones
,
B. Liskov
IEEE Transactions on Software Engineering
1976
Corpus ID: 16356936
Controlled sharing of information is needed for many applications. Access-control mechanisms exist in operating systems to…
Expand
1976
1976
An Access Control Facility for Programming Languages
Anita K. Jones
,
B. Liskov
1976
Corpus ID: 60028932
Abstract : Controlled sharing of information is needed and desirable for many applications. Access control mechanisms exist in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE