Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,467 papers from all fields of science
Search
Sign In
Create Free Account
File system permissions
Known as:
File permissions
, Read-only access
, Read rights
Expand
Most file systems have methods to assign permissions or access rights to specific users and groups of users. These systems control the ability of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
AppLocale
Bit field
Chmod
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Using Statistical Information to Communicate Android Permission Risks to Users
Lydia Kraus
,
I. Wechsung
,
Sebastian Möller
Workshop on Socio-Technical Aspects in Security…
2014
Corpus ID: 16660850
The Android OS has a permission-based security system that controls the third party applications' access to sensitive information…
Expand
Highly Cited
2011
Highly Cited
2011
Characterizing Memory Write References for Efficient Management of Hybrid PCM and DRAM Memory
Soyoon Lee
,
H. Bahn
,
S. Noh
IEEE 19th Annual International Symposium on…
2011
Corpus ID: 18897094
In order to reduce the energy dissipation in main memory of computer systems, phase change memory (PCM) has emerged as one of the…
Expand
2011
2011
A Scalable Design Methodology for Energy Minimization of STTRAM: A Circuit and Architecture Perspective
S. Chatterjee
,
M. Rasquinha
,
S. Yalamanchili
,
S. Mukhopadhyay
IEEE Transactions on Very Large Scale Integration…
2011
Corpus ID: 7270000
In this paper, we analyze the energy dissipation in spin-torque-transfer random access memory array (STTRAM). We present a…
Expand
Highly Cited
2010
Highly Cited
2010
SWEL: Hardware cache coherence protocols to map shared data onto shared caches
Seth H. Pugsley
,
J. Spjut
,
D. Nellans
,
R. Balasubramonian
International Conference on Parallel…
2010
Corpus ID: 7350052
Snooping and directory-based coherence protocols have become the de facto standard in chip multi-processors, but neither design…
Expand
Highly Cited
2008
Highly Cited
2008
Deterministic service guarantees for nand flash using partial block cleaning
Siddharth Choudhuri
,
T. Givargis
International Conference on Hardware/Software…
2008
Corpus ID: 10036396
NAND flash idiosyncrasies such as bulk erase and wear leveling results in non-linear and unpredictable read/write access times…
Expand
Highly Cited
2007
Highly Cited
2007
An ontology for secure socio-technical systems
F. Massacci
,
J. Mylopoulos
,
Nicola Zannone
2007
Corpus ID: 3551837
Security is often compromised by exploiting vulnerabilities in the interface between the organization and the information systems…
Expand
Review
2005
Review
2005
Student Traffic: Two-Way Movement between Vocational Education and Training and Higher Education. Support Document.
Roger J Harris
,
R. Sumner
,
L. Rainey
2005
Corpus ID: 151047344
The purpose of the study reported here was to investigate the extent and nature of the two-way traffic of students between…
Expand
Highly Cited
1987
Highly Cited
1987
Log files: an extended file service exploiting write-once storage
R. Finlayson
,
D. Cheriton
Symposium on Operating Systems Principles
1987
Corpus ID: 11007417
A log service provides efficient storage and retrieval of data that is written sequentially (append-only) and not subsequently…
Expand
1987
1987
Knowledge Acquisition by Analysis of Verbatim Protocols
B. Kuipers
,
J. Kassirer
1987
Corpus ID: 15929097
How does an expert physician reason about the mechanisms of the body? We are exploring the hypothesis that the physician has a…
Expand
1981
1981
First General-Purpose Electronic Computer
A. Burks
,
A. Burks
Annals of the History of Computing
1981
Corpus ID: 14205498
The conception, development, and design of the ENIAC are presented in the context of a causal history. Early influences…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE