Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,504,336 papers from all fields of science
Search
Sign In
Create Free Account
File system permissions
Known as:
File permissions
, Read-only access
, Read rights
Expand
Most file systems have methods to assign permissions or access rights to specific users and groups of users. These systems control the ability of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
AppLocale
Bit field
Chmod
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Using Statistical Information to Communicate Android Permission Risks to Users
Lydia Kraus
,
I. Wechsung
,
Sebastian Möller
Workshop on Socio-Technical Aspects in Security…
2014
Corpus ID: 16660850
The Android OS has a permission-based security system that controls the third party applications' access to sensitive information…
Expand
2011
2011
A Scalable Design Methodology for Energy Minimization of STTRAM: A Circuit and Architecture Perspective
S. Chatterjee
,
Mitchelle Rasquinha
,
S. Yalamanchili
,
S. Mukhopadhyay
IEEE Transactions on Very Large Scale Integration…
2011
Corpus ID: 7270000
In this paper, we analyze the energy dissipation in spin-torque-transfer random access memory array (STTRAM). We present a…
Expand
Highly Cited
2010
Highly Cited
2010
SWEL: Hardware cache coherence protocols to map shared data onto shared caches
Seth H. Pugsley
,
J. Spjut
,
D. Nellans
,
R. Balasubramonian
International Conference on Parallel…
2010
Corpus ID: 7350052
Snooping and directory-based coherence protocols have become the de facto standard in chip multi-processors, but neither design…
Expand
Highly Cited
2007
Highly Cited
2007
An ontology for secure socio-technical systems
F. Massacci
,
J. Mylopoulos
,
Nicola Zannone
2007
Corpus ID: 3551837
Security is often compromised by exploiting vulnerabilities in the interface between the organization and the information systems…
Expand
Review
2005
Review
2005
Student Traffic: Two-Way Movement between Vocational Education and Training and Higher Education. Support Document.
Roger J Harris
,
R. Sumner
,
L. Rainey
2005
Corpus ID: 151047344
The purpose of the study reported here was to investigate the extent and nature of the two-way traffic of students between…
Expand
2005
2005
HABILIDADES E DIFICULDADES DE LEITURA E ESCRITA EM CRIANÇAS DE 2ª SÉRIE: ABORDAGEM NEUROPSICOLÓGICA COGNITIVA
Jerusa Fumagalli de Salles
2005
Corpus ID: 170310415
A leitura e a escrita sao atividades mentais extremamente complexas, compostas por multiplos processos interdependentes e que…
Expand
2003
2003
The tees confidentiality model: an authorisation model for identities and roles
J. Longstaff
,
M. Lockyer
,
J. Nicholas
ACM Symposium on Access Control Models and…
2003
Corpus ID: 16823292
We present a model of authorisation that is more powerful than Role Based Access Control (RBAC), and is suitable for complex web…
Expand
Review
2000
Review
2000
"The ABCs in Appalachia": A Descriptive View of Perceptions of Higher Education in Appalachian Culture.
L. Wallace
,
Diane K. Diekroger
2000
Corpus ID: 157108576
This paper examines the negative messages that Appalachian students receive about pursuing a college education. Appalachian…
Expand
1996
1996
Fully parallel integrated CAM/RAM using preclassification to enable large capacities
K. J. Schultz
,
P. G. Gulak
IEEE J. Solid State Circuits
1996
Corpus ID: 16143685
Many applications would benefit from the availability of large-capacity content addressable memories (CAMs). However, while RAMs…
Expand
1980
1980
MU6-G. a new design to achieve mainframe performance from a mini-sized computer
D. Edwards
,
A. Knowles
,
J. V. Woods
International Symposium on Computer Architecture
1980
Corpus ID: 7224504
MU6-G is a high performance machine useful for general or scientific applications. Its order code and architecture are designed…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE