Skip to search formSkip to main contentSkip to account menu

Access control list

Known as: Ace (disambiguation), Access Control Entry, Access control lists 
An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
The research is support by National Natural ScienceFoundation of P. R. China ( Grant No.61170065,61373017,61171053,61103195 and… 
Highly Cited
2013
Highly Cited
2013
There has recently been an increased interest in named entity recognition and disambiguation systems at major conferences such as… 
Highly Cited
2006
Highly Cited
2006
Adequate security of information and information systems is a fundamental management responsibility. Nearly all applications that… 
Highly Cited
2005
Highly Cited
2005
Voice over Internet Protocol (VoIP) over a wireless local area network (WLAN) is poised to become an important Internet… 
Highly Cited
2005
Highly Cited
2005
The aim of this research is to develop an in-depth understanding of the dynamics of online group interaction and the relationship… 
Review
2004
Review
2004
Sentiment analysis seeks to identify the viewpoint(s) underlying a text span; an example application is classifying a movie… 
Highly Cited
2002
Highly Cited
2002
A key challenge in ad-hoc, data-gathering, wireless sensor networks is achieving a lifetime of several years using nodes that… 
Highly Cited
1998
Highly Cited
1998
  • J. Deng, Z. Haas
  • ICUPC '98. IEEE International Conference on…
  • 1998
  • Corpus ID: 62570213
In packet radio networks, the hidden terminal problem and the exposed terminal problem can severely reduce the utilization of a… 
Highly Cited
1992
Highly Cited
1992
We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a… 
Highly Cited
1974
Highly Cited
1974
The design of mechanisms to control the sharing of information in the Multics system is described. Five design principles help…