Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,295 papers from all fields of science
Search
Sign In
Create Free Account
Discretionary access control
Known as:
DAC
, DACL
In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
ACF2
Access control
Access control list
AppArmor
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Optimal Monetary Responses to Oil Discoveries
S. Wills
2014
Corpus ID: 54755141
This paper studies how monetary policy should respond to news about an oil discovery, using a workhorse New Keynesian model. Good…
Expand
2014
2014
Day-Ahead Versus Intraday Valuation of Demand-Side Flexibility for Photovoltaic and Wind Power Systems
Ernesto Garnier
,
R. Madlener
2014
Corpus ID: 155972515
This paper explores the economic benefits that wind and photovoltaic power plant operators can extract from the activation of…
Expand
2012
2012
The Effects of Goodwill Accounting on Informativeness of Earnings:Evidence from Earnings Persistence and Earnings’ Ability to Predict Future Cash Flows
Cheol Lee
,
Sung-Wook Yoon
2012
Corpus ID: 58898768
This paper examines the effect of SFAS No. 142 on the informativeness of earnings with two dimensions: (1) the ability of…
Expand
2009
2009
Discretionary Access Control
Gail-Joon Ahn
Encyclopedia of Database Systems
2009
Corpus ID: 32010845
TNI/TCSEC MATRIX A1 B3 B2 B1 C2 C1 DISCRETIONARY ACCESS Discretionary Access Control Identification and Authentication System…
Expand
2009
2009
Trojan horse resistant discretionary access control
Ziqing Mao
,
Ninghui Li
,
Hong Chen
,
Xuxian Jiang
ACM Symposium on Access Control Models and…
2009
Corpus ID: 2722657
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources…
Expand
Highly Cited
2009
Highly Cited
2009
Assessing Earnings and Accruals Quality : U . S . and International Evidence
Peter D. Wysocki
2009
Corpus ID: 31157770
This paper examines the properties and validity of “accounting quality” proxies derived from the Dechow and Dichev (DD, 2002…
Expand
2009
2009
The Incidence of the Land Use Regulatory Tax
Ron Cheung
,
K. Ihlanfeldt
,
Tom Mayock
2009
Corpus ID: 43532747
Land use regulation has been found to impose a substantial tax on housing within select U.S. metropolitan areas. In this article…
Expand
2005
2005
On an analysis of the day-to-day variability in the individual's action space : an exploration of the six-week Mobidrive travel diary data
Y. Susilo
,
R. Kitamura
2005
Corpus ID: 107012989
On an analysis of the day-to-day variability in the individual’s action space : An exploration of the six-week Mobidrive travel…
Expand
1995
1995
Locating Discretionary Service Facilities Based on Probabilistic Customer Flows
O. Berman
,
D. Krass
,
C. Xu
Transportation Science
1995
Corpus ID: 39048041
In this paper, we consider the problem of locating discretionary facilities on a network. In contrast to previous work in the…
Expand
1990
1990
TAXES AND SPENDING UNDER GRAMM-RUDMAN-HOLLINGS
R. Reischauer
National tax journal
1990
Corpus ID: 59415971
Discusses the three key elements of Gramm-Rudman-Hollings (GRH) that were expected to affect budgeting. Concludes that while many…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required