Skip to search formSkip to main contentSkip to account menu

Comparison of privilege authorization features

Known as: Privilege elevation, Gksu, Ktsuss 
A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
In this paper, we focus on the need for mining the relevance of computer security vulnerabilities and propose an automatic… 
2015
2015
The Universal Physical Access Control System (UPACS) is a communication protocol designed to provide secure access to remote… 
2015
2015
At present, With the wide application of Linux system, the security performance of Linux system is meeting more and more… 
2014
2014
Recently, Yeh et al. proposed a portable privacy-preserving authentication and access control protocol, named PAACP, for non… 
2013
2013
A wireless LAN roaming system enables a user to access to a wireless network at a visiting institution with his/her account… 
2011
2011
To better protect users from security incidents, the principle of least privilege (PLP) requires that users and programs be… 
2011
2011
Microsoft Windows allows for the registration of COM objects in the user hive of the system registry, and these per-user COM… 
2009
2009
Access control of multi-domain application in distribute computing environments is one of the important issues in implementing… 
2004
2004
extent, the defender. Defenders need a way of determining whether or not their detectors will detect a given attack. A defense…