Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,332,755 papers from all fields of science
Search
Sign In
Create Free Account
Privilege (computing)
Known as:
Secpol.msc
, Computer privilege
, Privilege (computer science)
Expand
In computing, privilege is defined as the delegation of authority over a computer system. A privilege allows a user to perform an action. Examples of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
Authentication server
Backup
CPU modes
Comparison of operating systems
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Drafting an Effective Ethical Code of Conduct for Professional Societies: A Practical Guide
M. Hardy
2016
Corpus ID: 157505279
Academic, medical, and research communities are struggling to quickly and effectively address unethical conduct within their…
Expand
2015
2015
The Game of Social Life
Kosha D. Bramesfeld
,
Arla Good
2015
Corpus ID: 143860460
This article presents the development of a new simulation activity, the Game of Social Life. The activity introduces students to…
Expand
2015
2015
Design of a Framework for Supporting the Execution-Management of Small and Medium sized Projects in the AEC-industry
P. Dallasega
,
E. Marengo
,
L. Rescic
2015
Corpus ID: 46909550
The paper describes a framework for efficiently organizing and managing construction projects, aimed at reducing time and cost…
Expand
2006
2006
A Testbed for Comparing Trust Computation Algorithms
George Theodorakopoulos
,
J. Baras
2006
Corpus ID: 8592715
Trust is the expectation of a person about another person’s behavior. Trust is important for many security related decisions…
Expand
2004
2004
AdOrBAC: an administration model for Or-BAC
F. Cuppens
,
A. Miège
Computer systems science and engineering
2004
Corpus ID: 16863229
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects…
Expand
2004
2004
Dual Citizenship and Policies toward Kin minorities in East-Central Europe: A Comparison between Hungary, Romania and the Republic of Moldova
Constantin Iordachi
2004
Corpus ID: 171085991
The adoption of the ‘Act on Hungarians Living in Neighbouring Countries’ (generally referred to as the Status Law) by the…
Expand
2001
2001
Which operating system access control technique will provide the greatest overall benefit to users?
Stephen Dale Smalley
ACM Symposium on Access Control Models and…
2001
Corpus ID: 31649307
ly, traditional mandatory access controls provide strong guarantees for the separation of information based on its…
Expand
1998
1998
Expressing power and status through aesthetics in Mijikenda society
E. Orchardson-Mazrui
1998
Corpus ID: 144608438
This article pinpoints the dynamic interaction of aesthetics, power and status in 'traditional' society. The article adopts the…
Expand
1986
1986
Territorial Claims in Antarctica: A Modern Way to Deal with an Old Problem
B. Conforti
1986
Corpus ID: 55746639
1933
1933
Ionospheric Investigations in High Latitudes
E. Appleton
,
R. Naismith
,
G. Builder
Nature
1933
Corpus ID: 4138587
IN connexion with the International Polar Year 1932-33, a series of wireless observations has been made at Tromsô (lat. 690 39.8…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE