Privilege (computing)

Known as: Secpol.msc, Computer privilege, Privilege (computer science) 
In computing, privilege is defined as the delegation of authority over a computer system. A privilege allows a user to perform an action. Examples of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Free-air CO2 enrichment (FACE) experiments have provided novel insights into the ecological mechanisms controlling the cycling… (More)
  • figure 1
Is this relevant?
2008
2008
  • Stefan Voigta, Axel Dreherb
  • 2008
This paper analyzes whether nation-state governments can increase their credibility by becoming members of international… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2008
2008
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of… (More)
  • figure 1
Is this relevant?
2007
2007
Northern peatlands are important stores of carbon and reservoirs of biodiversity that are vulnerable to global change. However… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2003
2003
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic… (More)
  • figure 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
BACKGROUND Elevated urine albumin excretion (UAER) is a modifiable risk factor for renal and cardiovascular disease in type 2… (More)
  • table 1
  • table 2
  • figure 2
  • figure 1
  • table 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
With the enormous growth in processor performance over the last decade, it is clear that reliability, rather than performance, is… (More)
  • table 2
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In this article, we present an authorization model that can be used to express a number of discretionary access control policies… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1990
Highly Cited
1990
ions. A modular abstraction can be included in many places even though it is never directly exposed to a user. The invoice… (More)
Is this relevant?