Skip to search formSkip to main contentSkip to account menu

File system permissions

Known as: File permissions, Read-only access, Read rights 
Most file systems have methods to assign permissions or access rights to specific users and groups of users. These systems control the ability of the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The Android OS has a permission-based security system that controls the third party applications' access to sensitive information… 
2011
2011
In this paper, we analyze the energy dissipation in spin-torque-transfer random access memory array (STTRAM). We present a… 
Highly Cited
2010
Highly Cited
2010
Snooping and directory-based coherence protocols have become the de facto standard in chip multi-processors, but neither design… 
Highly Cited
2007
Highly Cited
2007
Security is often compromised by exploiting vulnerabilities in the interface between the organization and the information systems… 
Review
2005
Review
2005
The purpose of the study reported here was to investigate the extent and nature of the two-way traffic of students between… 
2005
2005
A leitura e a escrita sao atividades mentais extremamente complexas, compostas por multiplos processos interdependentes e que… 
2003
2003
We present a model of authorisation that is more powerful than Role Based Access Control (RBAC), and is suitable for complex web… 
Review
2000
Review
2000
This paper examines the negative messages that Appalachian students receive about pursuing a college education. Appalachian… 
1996
1996
Many applications would benefit from the availability of large-capacity content addressable memories (CAMs). However, while RAMs… 
1980
1980
MU6-G is a high performance machine useful for general or scientific applications. Its order code and architecture are designed…