Skip to search formSkip to main contentSkip to account menu

File system permissions

Known as: File permissions, Read-only access, Read rights 
Most file systems have methods to assign permissions or access rights to specific users and groups of users. These systems control the ability of the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The Android OS has a permission-based security system that controls the third party applications' access to sensitive information… 
Highly Cited
2011
Highly Cited
2011
In order to reduce the energy dissipation in main memory of computer systems, phase change memory (PCM) has emerged as one of the… 
2011
2011
In this paper, we analyze the energy dissipation in spin-torque-transfer random access memory array (STTRAM). We present a… 
Highly Cited
2010
Highly Cited
2010
Snooping and directory-based coherence protocols have become the de facto standard in chip multi-processors, but neither design… 
Highly Cited
2008
Highly Cited
2008
NAND flash idiosyncrasies such as bulk erase and wear leveling results in non-linear and unpredictable read/write access times… 
Highly Cited
2007
Highly Cited
2007
Security is often compromised by exploiting vulnerabilities in the interface between the organization and the information systems… 
Review
2005
Review
2005
The purpose of the study reported here was to investigate the extent and nature of the two-way traffic of students between… 
Highly Cited
1987
Highly Cited
1987
A log service provides efficient storage and retrieval of data that is written sequentially (append-only) and not subsequently… 
1987
1987
How does an expert physician reason about the mechanisms of the body? We are exploring the hypothesis that the physician has a… 
1981
1981
The conception, development, and design of the ENIAC are presented in the context of a causal history. Early influences…