Skip to search formSkip to main contentSkip to account menu

Principle of least privilege

Known as: Least user access, POLP, Principle of Least Authority 
In information security, computer science, and other fields, the principle of least privilege (also known as the principle of minimal privilege or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
In order to provide high-security remote authentication, the three-factor authentication scheme combining biometric with smart… 
2014
2014
In this paper, we present a novel interdomain network architecture that is based on the application of the principle of least… 
2013
2013
A critical challenge in cloud computing is assuring confidentiality and integrity for the execution of arbitrary software in a… 
2011
2011
with the development of cloud computing, cloud security issues have recently gained traction in the research community. Although… 
2009
2009
Mobile ad-hoc network which is constructed via mobile nodes without the pre-registration of nodes have created problem in… 
2009
2009
Globalisation has been criticised for challenging national sovereignty and cultural identities.  Although its cultural… 
2008
2008
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor… 
2005
2005
Fisheries management regimes take many forms, but most fail to designate shares of the catch. This failure creates strong…