Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,588 papers from all fields of science
Search
Sign In
Create Free Account
Privilege (computing)
Known as:
Secpol.msc
, Computer privilege
, Privilege (computer science)
Expand
In computing, privilege is defined as the delegation of authority over a computer system. A privilege allows a user to perform an action. Examples of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
Authentication server
Backup
CPU modes
Comparison of operating systems
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Citizenship Revocation, the Privilege to Have Rights and the Production of the Alien
Audrey Macklin
2014
Corpus ID: 154165695
Citizenship revocation has emerged in the UK and Canada as a supplement to the counter-terrorism toolkit, and is on the…
Expand
Highly Cited
2009
Highly Cited
2009
The social cost of rent seeking in Europe
K. Angelopoulos
,
A. Philippopoulos
,
Vanghelis Vassilatos
2009
Corpus ID: 53966379
Review
2007
Review
2007
Personality and career success
T. Judge
,
J. Kammeyer-Mueller
2007
Corpus ID: 48815467
The relationship between personality and career success has provoked a great deal of speculation. It has often been asserted that…
Expand
Highly Cited
2005
Highly Cited
2005
User-Level Device Drivers: Achieved Performance
Ben Leslie
,
P. Chubb
,
+7 authors
Gernot Heiser
Journal of Computational Science and Technology
2005
Corpus ID: 1121537
Running device drivers as unprivileged user-level code, encapsulated into their own process, has often been proposed as a…
Expand
Highly Cited
2003
Highly Cited
2003
Using Trust for Secure Collaboration in Uncertain Environments
V. Cahill
,
Elizabeth Gray
,
+15 authors
M. Nielsen
IEEE pervasive computing
2003
Corpus ID: 16744851
The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how…
Expand
Review
2003
Review
2003
Physiological Impacts of Elevated CO2 Concentration Ranging from Molecular to Whole Plant Responses
O. Urban
Photosynthetica (Praha)
2003
Corpus ID: 19494683
The dynamics of the terrestrial ecosystems depend on interactions between a number of biogeochemical cycles (i.e. carbon…
Expand
Highly Cited
1999
Highly Cited
1999
A flexible authorization mechanism for relational data management systems
E. Bertino
,
S. Jajodia
,
P. Samarati
TOIS
1999
Corpus ID: 4040603
In this article, we present an authorization model that can be used to express a number of discretionary access control policies…
Expand
Highly Cited
1988
Highly Cited
1988
The schematic protection model: its definition and analysis for acyclic attenuating schemes
R. Sandhu
JACM
1988
Corpus ID: 12884546
The protection state of a system is defined by the privileges possessed by subjects at a given moment. Operations that change…
Expand
Highly Cited
1986
Highly Cited
1986
Property rights in economic history: Implications for research
G. Libecap
1986
Corpus ID: 35599828
Highly Cited
1971
Highly Cited
1971
Behavioral contracting within the families of delinquents
R. Stuart
1971
Corpus ID: 54673776
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE