Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Principle of least privilege
Known as:
Least user access
, POLP
, Principle of Least Authority
Expand
In information security, computer science, and other fields, the principle of least privilege (also known as the principle of minimal privilege or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACM Computing Surveys
Access control
Ambient authority
Application virtualization
Expand
Broader (1)
Information theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Remote three-factor authentication scheme based on Fuzzy extractors
Min Zhang
,
Jiashu Zhang
,
Y. Zhang
Secur. Commun. Networks
2015
Corpus ID: 31580238
In order to provide high-security remote authentication, the three-factor authentication scheme combining biometric with smart…
Expand
2014
2014
An Internet Architecture Based on the Principle of Least Privilege
Vincent Liu
,
Seungyeop Han
,
Ada Lerner
,
A. Krishnamurthy
,
T. Anderson
2014
Corpus ID: 5119752
In this paper, we present a novel interdomain network architecture that is based on the application of the principle of least…
Expand
2014
2014
Analiza parametrów pracy wybranych czujników pola magnetycznego
T. Prauzner
,
P. Ptak
2014
Corpus ID: 107149819
2013
2013
Defense-in-Depth Against Malicious Insiders in the Cloud
F. Rocha
,
Thomas Gross
,
A. Moorsel
IEEE International Conference on Cloud…
2013
Corpus ID: 15091330
A critical challenge in cloud computing is assuring confidentiality and integrity for the execution of arbitrary software in a…
Expand
2011
2011
SecDM: Securing Data Migration between Cloud Storage Systems
Qingni Shen
,
Lizhe Zhang
,
Xin Yang
,
Yahui Yang
,
Zhonghai Wu
,
Y. Zhang
IEEE Ninth International Conference on Dependable…
2011
Corpus ID: 17436716
with the development of cloud computing, cloud security issues have recently gained traction in the research community. Although…
Expand
2009
2009
Forming Trust in Mobile Ad Hoc Network
Asmidar Abu Bakar
,
J. Manan
,
J. Jais
,
J. Manan
WRI International Conference on Communications…
2009
Corpus ID: 17892680
Mobile ad-hoc network which is constructed via mobile nodes without the pre-registration of nodes have created problem in…
Expand
2009
2009
MEDIA CONSUMPTION AMONG YOUNG ADULTS: A LOOK AT LABELS AND NORMS IN EVERYDAY LIFE
L. Pawanteh
,
S. Rahim
,
Fauzia Ahmad
2009
Corpus ID: 55597887
Globalisation has been criticised for challenging national sovereignty and cultural identities. Although its cultural…
Expand
2008
2008
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks
Hui Song
,
Sencun Zhu
,
Wensheng Zhang
,
G. Cao
ACM Trans. Sens. Networks
2008
Corpus ID: 53224591
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor…
Expand
2005
2005
Rights-based Fisheries Management: An Environmentalist Perspective
R. Fujita
,
Kate Bonzon
Reviews in Fish Biology and Fisheries
2005
Corpus ID: 23327301
Fisheries management regimes take many forms, but most fail to designate shares of the catch. This failure creates strong…
Expand
Highly Cited
2005
Highly Cited
2005
Synthesis and characterization of fatty acids passivated silver nanoparticles—their interaction with PPy
C. R. Rao
,
D. C. Trivedi
2005
Corpus ID: 260747391
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE