C-list (computer security)

Known as: C-list, C-list index, Capability list 
In capability-based computer security, a C-list is an array of capabilities, usually associated with a process and maintained by the kernel. The… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1976-2017
01219762017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Cloud computing is very popular in organizations and institutions because it provides storage and computing services at very low… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Review
2013
Review
2013
In February 2010, Canada hosted the Vancouver 2010 Winter Games. To ensure a Safe and Secure Games, multiple safety and security… (More)
  • figure 1
  • figure 2
Is this relevant?
2013
2013
Remotely operating teams of autonomous mobile robots for multi-task allocations in an unknown environment is an important and… (More)
  • figure I
  • table 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2011
2011
A grouping delegation model are presented to deal with multi-robot task allocation problem. In real life, in order to improve the… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2011
2011
The collaboration between mobile service robots and household appliances in smart home is proposed based on IGRS protocol. By… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 4
Is this relevant?
2007
2007
  • Cornelius Lowell Robling
  • 2007
data types are also called extended-type objects, because they extend the<lb>basic built-in types of a programming language… (More)
Is this relevant?
2006
2006
Impromptu collaboration, often characterized as being opportunistic, spontaneous, proximity-based, and transient, is fast… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2005
2005
Often, enforcing security incurs overhead, and as a result may degrade the performance of a system. In this paper, we attempt to… (More)
  • figure 2
  • figure 3
  • figure 6
  • figure 8
Is this relevant?
2002
2002
  • 2002
CAI'AJ3ILITY Names an abstract object and contains type-specific rights. TOKEN CAPABILITY Identifies the owner as the possessor… (More)
  • figure 7-1
  • figure 7-2
  • figure 7-3
  • figure 7-4
Is this relevant?
1976
1976
This is a preprint of a paper intended for publication in a journal of proceedings. Since changes may be made before publication… (More)
Is this relevant?