Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,506,259 papers from all fields of science
Search
Sign In
Create Free Account
Access control list
Known as:
Ace (disambiguation)
, Access Control Entry
, Access control lists
Expand
An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
49 relations
AOS/VS II
Access control expression
Ambient authority
CVS Suite (CVSNT 2.8)
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
An efficient authentication and access control scheme for perception layer of Internet of Things
Ye Ning
,
Yan-qin Zhu
,
Ru-chuan Wang
,
R. Malekian
,
Lin Qiao-min
2014
Corpus ID: 16767340
The research is support by National Natural ScienceFoundation of P. R. China ( Grant No.61170065,61373017,61171053,61103195 and…
Expand
Highly Cited
2013
Highly Cited
2013
Improving efficiency and accuracy in multilingual entity extraction
Joachim Daiber
,
Max Jakob
,
Chris Hokamp
,
Pablo N. Mendes
I-SEMANTICS '13
2013
Corpus ID: 207206865
There has recently been an increased interest in named entity recognition and disambiguation systems at major conferences such as…
Expand
Highly Cited
2006
Highly Cited
2006
Assessment of Access Control Systems
Vincent C. Hu
,
David F. Ferraiolo
,
D. R. Kuhn
2006
Corpus ID: 221184353
Adequate security of information and information systems is a fundamental management responsibility. Nearly all applications that…
Expand
Highly Cited
2005
Highly Cited
2005
Solutions to performance problems in VoIP over a 802.11 wireless LAN
Wei Wang
,
S. Liew
,
V. Li
IEEE Transactions on Vehicular Technology
2005
Corpus ID: 828219
Voice over Internet Protocol (VoIP) over a wireless local area network (WLAN) is poised to become an important Internet…
Expand
Highly Cited
2005
Highly Cited
2005
A multilevel analysis of sociability, usability, and community dynamics in an online health community
Diane Maloney-Krichmar
,
J. Preece
TCHI
2005
Corpus ID: 16114424
The aim of this research is to develop an in-depth understanding of the dynamics of online group interaction and the relationship…
Expand
Review
2004
Review
2004
A Sentimental Education: Sentiment Analysis Using Subjectivity Summarization Based on Minimum Cuts
B. Pang
,
Lillian Lee
ACL
2004
Corpus ID: 388
Sentiment analysis seeks to identify the viewpoint(s) underlying a text span; an example application is classifying a movie…
Expand
Highly Cited
2002
Highly Cited
2002
Bounding the lifetime of sensor networks via optimal role assignments
Manish Bhardwaj
,
A. Chandrakasan
Proceedings.Twenty-First Annual Joint Conference…
2002
Corpus ID: 7011974
A key challenge in ad-hoc, data-gathering, wireless sensor networks is achieving a lifetime of several years using nodes that…
Expand
Highly Cited
1998
Highly Cited
1998
Dual busy tone multiple access (DBTMA): a new medium access control for packet radio networks
J. Deng
,
Z. Haas
ICUPC '98. IEEE International Conference on…
1998
Corpus ID: 62570213
In packet radio networks, the hidden terminal problem and the exposed terminal problem can severely reduce the utilization of a…
Expand
Highly Cited
1992
Highly Cited
1992
Authentication in distributed systems: theory and practice
B. Lampson
,
M. Abadi
,
M. Burrows
,
E. Wobber
TOCS
1992
Corpus ID: 13560025
We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a…
Expand
Highly Cited
1974
Highly Cited
1974
Protection and the control of information sharing in multics
J. Saltzer
CACM
1974
Corpus ID: 326132
The design of mechanisms to control the sharing of information in the Multics system is described. Five design principles help…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE