Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,758 papers from all fields of science
Search
Sign In
Create Free Account
Comparison of privilege authorization features
Known as:
Privilege elevation
, Gksu
, Ktsuss
Expand
A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Broader (1)
Computer access control
Control-Alt-Delete
DOS
Keystroke logging
Kubuntu
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System
A. MinYoun
2019
Corpus ID: 198318754
2017
2017
An Automatic Vulnerabilities Classification Method Based on Their Relevance
H. Zhang
,
Kun Lv
,
Changzhen Hu
International Conference on Network and System…
2017
Corpus ID: 24219826
In this paper, we focus on the need for mining the relevance of computer security vulnerabilities and propose an automatic…
Expand
2015
2015
Implementation of the universal physical access control system (UPACS)
Clyde Carryl
,
B. Alhalabi
IEEE Radio and Wireless Symposium
2015
Corpus ID: 45050914
The Universal Physical Access Control System (UPACS) is a communication protocol designed to provide secure access to remote…
Expand
2015
2015
A Role-Based Model of Linux Privilege Management and its Implementation
Yanzhao Li
,
Bibo Tu
,
Min Zhu
,
Dan Meng
International Conference on Computational…
2015
Corpus ID: 14036935
At present, With the wide application of Linux system, the security performance of Linux system is meeting more and more…
Expand
2014
2014
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs
S. Horng
,
Shiang-Feng Tzeng
,
Xian Wang
,
Shaojie Qiao
,
Xun Gong
,
M. Khan
Wireless personal communications
2014
Corpus ID: 2030242
Recently, Yeh et al. proposed a portable privacy-preserving authentication and access control protocol, named PAACP, for non…
Expand
2013
2013
Fault-Tolerant Wireless LAN Roaming System Using Client Certificates
Shunichi Kinoshita
,
Toshiki Watanabe
,
Y. Yamasaki
,
Hideaki Goto
,
H. Sone
IEEE 37th Annual Computer Software and…
2013
Corpus ID: 14449451
A wireless LAN roaming system enables a user to access to a wireless network at a visiting institution with his/her account…
Expand
2011
2011
Towards supporting users in assessing the risk in privilege elevation
S. Motiee
2011
Corpus ID: 167530173
To better protect users from security incidents, the principle of least privilege (PLP) requires that users and programs be…
Expand
2011
2011
THE DANGERS OF PER-USER COM OBJECTS IN WINDOWS
J. Larimer
2011
Corpus ID: 62268038
Microsoft Windows allows for the registration of COM objects in the user hive of the system registry, and these per-user COM…
Expand
2009
2009
IRBAC 2000 Model Security Research
Chen Hongbo
2009
Corpus ID: 63457746
Access control of multi-domain application in distribute computing environments is one of the important issues in implementing…
Expand
2004
2004
DEVELOPING A DEFENSE-CENTRIC ATTACK TAXOMONY
R. Maxion
,
Kevin S. Killourhy
,
K. Tan
2004
Corpus ID: 106992589
extent, the defender. Defenders need a way of determining whether or not their detectors will detect a given attack. A defense…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE