Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,692,063 papers from all fields of science
Search
Sign In
Create Free Account
Access control list
Known as:
Ace (disambiguation)
, Access Control Entry
, Access control lists
Expand
An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
AOS/VS II
Access control expression
Ambient authority
CVS Suite (CVSNT 2.8)
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Dynamic AIFSN tuning for improving the QoS over IEEE 802.11 WLANs
Estefanía Coronado
,
Jose Miguel Villalón Millán
,
A. Garrido
International Wireless Communications and Mobile…
2015
Corpus ID: 14142427
The original version of the IEEE 802.11 standard is not able to provide the required Quality of Service (QoS) for real-time…
Expand
2010
2010
Aligned texture map creation for pose invariant face recognition
A. Rama
,
F. Tarrés
,
J. Rurainsky
Multimedia tools and applications
2010
Corpus ID: 8083054
In last years, Face recognition based on 3D techniques is an emergent technology which has demonstrated better results than…
Expand
2009
2009
Routing Tables: Is Smaller Really Much Better?
K. Fall
,
Brighten Godfrey
,
G. Iannaccone
,
Sylvia Ratnasamy
ACM Workshop on Hot Topics in Networks
2009
Corpus ID: 16343497
We examine the case for small Internet routing and forwarding tables in the context of router design. If Moore’s Law drives…
Expand
Highly Cited
2009
Highly Cited
2009
Modeling and understanding end-to-end class of service policies in operational networks
Y. Sung
,
C. Lund
,
M. Lyn
,
Sanjay G. Rao
,
S. Sen
Conference on Applications, Technologies…
2009
Corpus ID: 9701479
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs…
Expand
2007
2007
Authorizing applications in singularity
Ted Wobber
,
Aydan R. Yumerefendi
,
M. Abadi
,
Andrew Birrell
,
Daniel R. Simon
European Conference on Computer Systems
2007
Corpus ID: 1188745
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design…
Expand
2005
2005
Discovery of amino acid amides as new substrates for α-amino-ɛ-caprolactam racemase from Achromobacter obae
Y. Asano
,
Shigenori Yamaguchi
2005
Corpus ID: 54805044
2004
2004
A Security Infrastructure for Trust Management in Multi-agent Systems
A. Poggi
,
M. Tomaiuolo
,
G. Vitaglione
Trusting Agents for Trusting Electronic Societies
2004
Corpus ID: 16425688
Multi-agent systems are based on the interaction of autonomous software components, the agents, which cooperate to achieve common…
Expand
1998
1998
Protected resource access for mobile agent-based distributed computing
A. Tripathi
,
Neeran M. Karnik
Proceedings of the ICPP Workshop on…
1998
Corpus ID: 18578808
This paper describes the mobile agent paradigm for distributed computing, and outlines the security-related issues encountered in…
Expand
1997
1997
Temporal relations in English and German narrative discourse
Frank Schilder
1997
Corpus ID: 153683968
Understanding the temporal relations which hold between situations described in a narrative is a highly complex process. The main…
Expand
Highly Cited
1996
Highly Cited
1996
Phase transition buoyancy contributions to stresses in subducting lithosphere
C. Bina
1996
Corpus ID: 129156883
The sequence of phase transitions undergone by minerals with increasing depth in Earth's mantle is perturbed within subducting…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE