Skip to search formSkip to main contentSkip to account menu

High-water mark (computer security)

Known as: Low watermark (computer security), High watermark, Low watermark 
Under high-water mark, any object less than the user's security level can be opened, but the object is relabeled to reflect the highest security… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Reusable intellectual property (IP) cores used in the consumer electronic devices, representing years of valuable investment… 
2013
2013
Unlike hard disks, flash devices use out-of-place updates operations and require a garbage collection (GC) process to reclaim… 
Highly Cited
2011
Highly Cited
2011
NAND flash memory is a preferred storage media for various platforms ranging from embedded systems to enterprise-scale systems… 
2007
2007
In this Article, Professor Parrish explores the legitimacy of the U.S. Supreme Court's use of foreign law in constitutional… 
2006
2006
Quantization-based schemes, such as scalar DC-QIM, have demonstrated performance merits for data-hiding problem, which is mainly… 
Review
2004
Review
2004
Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for… 
Highly Cited
2004
Highly Cited
2004
  • G. Stoker
  • Government Beyond the Centre
  • 2004
  • Corpus ID: 40572917
Highly Cited
2001
Highly Cited
2001
We propose a set of baseline heuristics for identifying genuinely tabular information and news links in HTML documents. A…