Principal (computer security)

Known as: Principal, Security principal 
A principal in computer security is an entity that can be authenticated by a computer system or network. It is referred to as a security principal in… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2003-2017
012320032017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The Android operating system provides a rich security model that specifies over 100 distinct permissions. Before performing a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2014
Review
2014
The modern digital internet economy and billions of dollars of trade are made possible by the internet security which is provided… (More)
  • table I
Is this relevant?
2013
2013
With the advent of Web 2.0, web developers have designed multiple additions to break SOP boundary, such as splitting and… (More)
  • table I
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2013
2013
The non-interference (NI) property defines a program to be secure if changes to high-security inputs cannot alter the values of… (More)
Is this relevant?
Review
2012
Review
2012
347 All Rights Reserved © 2012 IJARCET  Abstract— Biometric based authentication and recognition, the science of using physical… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2006
2006
This paper deals with oriented engineering application of voltage security analysis of large-scale power systems, including… (More)
  • table 1
Is this relevant?
2005
2005
Causeway provides runtime support for the development of distributed meta-applications. These meta-applications control or… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2005
2005
Security is a very important concern for software architecture and software components. Previous modeling approaches provide… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2005
2005
The authors introduced a new service discovery and matchmaking architecture, layered on top of Globus MDS3, that integrates… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2003
2003
We are developing a secure programming language, M, that can be used for programming networked spaces: dynamically extensible… (More)
Is this relevant?