Skip to search formSkip to main contentSkip to account menu

Principle of least privilege

Known as: Least user access, POLP, Principle of Least Authority 
In information security, computer science, and other fields, the principle of least privilege (also known as the principle of minimal privilege or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Attribute-based encryption (ABE) supports the fine-grained sharing of encrypted data. In some common designs, attributes are… 
Review
2015
Review
2015
In order to provide high-security remote authentication, the three-factor authentication scheme combining biometric with smart… 
2014
2014
In this paper, we present a novel interdomain network architecture that is based on the application of the principle of least… 
2013
2013
A critical challenge in cloud computing is assuring confidentiality and integrity for the execution of arbitrary software in a… 
Review
2012
Review
2012
A salient aspect of protection system design is the set of the mechanisms for the representation, distribution, verification and… 
2009
2009
Mobile ad-hoc network which is constructed via mobile nodes without the pre-registration of nodes have created problem in… 
2008
2008
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor… 
2005
2005
Fisheries management regimes take many forms, but most fail to designate shares of the catch. This failure creates strong…