Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,740,542 papers from all fields of science
Search
Sign In
Create Free Account
Privilege (computing)
Known as:
Secpol.msc
, Computer privilege
, Privilege (computer science)
Expand
In computing, privilege is defined as the delegation of authority over a computer system. A privilege allows a user to perform an action. Examples of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
Authentication server
Backup
CPU modes
Comparison of operating systems
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The Game of Social Life
Kosha D. Bramesfeld
,
Arla Good
2015
Corpus ID: 143860460
This article presents the development of a new simulation activity, the Game of Social Life. The activity introduces students to…
Expand
2011
2011
The Basic Law and Democratization in Hong Kong
Michael C. Davis
2011
Corpus ID: 150790947
Hong Kong's constitution, the Hong Kong Basic Law ("Basic Law"), has sparked a number of debates over democratization and its…
Expand
2008
2008
A location aware role and attribute based access control system
I. Cruz
,
Rigel Gjomemo
,
B. Lin
,
Mirko Orsini
ACM SIGSPATIAL International Workshop on Advances…
2008
Corpus ID: 11324425
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of…
Expand
2006
2006
Semiotics and Intelligent Systems Development : An Introduction
Ricardo Ribeiro Gudwin
2006
Corpus ID: 15763000
Sometimes, in order to mature, a methodology operates outside the mainstream for a period of time; it becomes the mainstream…
Expand
Review
2005
Review
2005
Examining the Impact of Workplace Supports: Work-Family Fit and Satisfaction in the U.S. Military
Jennifer M. McFadyen
,
J. Kerpelman
,
Francesca Adler‐Baeder
2005
Corpus ID: 73665096
Abstract: The current study sought to discover whether workplace support provided by Army Family Team Building (AFTB) of the…
Expand
Review
2004
Review
2004
A Detection-Oriented Classification of Insider IT Misuse
A. H. Phyo
,
S. Furnell
2004
Corpus ID: 15761584
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is…
Expand
2004
2004
AdOrBAC: an administration model for Or-BAC
F. Cuppens
,
A. Miège
Computer systems science and engineering
2004
Corpus ID: 16863229
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects…
Expand
1999
1999
Landscape use and economic value of Eurasian beaver (Castor fiber) on large forest in southeast Norway
H. Parker
,
Asbjørn Haugen
,
Øystein Kristensen
,
Erik Myrum
,
Ronni Kolsing
,
F. Rosell
1999
Corpus ID: 56450577
Though numerous studies of damage caused by beaver (Castor canadensis and C. fiber) to commercially managed forests have been…
Expand
1997
1997
The subsidy provided by the federal safety net: theory, measurement, and containment
M. Kwast
,
Wayne Passmore
1997
Corpus ID: 15337292
This paper presents an intuitive and analytical model of how the federal safety net affects banks' cost of funds. Emphasis is…
Expand
1933
1933
Ionospheric Investigations in High Latitudes
E. Appleton
,
R. Naismith
,
G. Builder
Nature
1933
Corpus ID: 4138587
IN connexion with the International Polar Year 1932-33, a series of wireless observations has been made at Tromsô (lat. 690 39.8…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE