Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,382,741 papers from all fields of science
Search
Sign In
Create Free Account
Privilege (computing)
Known as:
Secpol.msc
, Computer privilege
, Privilege (computer science)
Expand
In computing, privilege is defined as the delegation of authority over a computer system. A privilege allows a user to perform an action. Examples of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
Authentication server
Backup
CPU modes
Comparison of operating systems
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Drafting an Effective Ethical Code of Conduct for Professional Societies: A Practical Guide
M. Hardy
2016
Corpus ID: 157505279
Academic, medical, and research communities are struggling to quickly and effectively address unethical conduct within their…
Expand
2013
2013
Corruption and Anti-corruption in China: Challenges and Countermeasures
Changzheng Dai
2013
Corpus ID: 39719053
Corruption and Anti-corruption has become a hotly debated issue in China, both among scholars as well as common people. No doubt…
Expand
2011
2011
The Basic Law and Democratization in Hong Kong
Michael C. Davis
2011
Corpus ID: 150790947
Hong Kong's constitution, the Hong Kong Basic Law ("Basic Law"), has sparked a number of debates over democratization and its…
Expand
2008
2008
A location aware role and attribute based access control system
I. Cruz
,
Rigel Gjomemo
,
B. Lin
,
Mirko Orsini
ACM SIGSPATIAL International Workshop on Advances…
2008
Corpus ID: 11324425
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of…
Expand
Review
2004
Review
2004
A Detection-Oriented Classification of Insider IT Misuse
A. H. Phyo
,
S. Furnell
2004
Corpus ID: 15761584
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is…
Expand
2004
2004
AdOrBAC: an administration model for Or-BAC
F. Cuppens
,
A. Miège
Computer systems science and engineering
2004
Corpus ID: 16863229
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects…
Expand
2004
2004
Dual Citizenship and Policies toward Kin minorities in East-Central Europe: A Comparison between Hungary, Romania and the Republic of Moldova
Constantin Iordachi
2004
Corpus ID: 171085991
The adoption of the ‘Act on Hungarians Living in Neighbouring Countries’ (generally referred to as the Status Law) by the…
Expand
Review
1999
Review
1999
Operating System Structure and Processor Architecture for a Large Distributed Single Address Space
Alan Skousen
,
Donald S. Miller
1999
Corpus ID: 12810934
Recent 64-bit microprocessors have made a huge 18.4 quintillion byte address space potentially available to applications and the…
Expand
1997
1997
The subsidy provided by the federal safety net: theory, measurement, and containment
M. Kwast
,
Wayne Passmore
1997
Corpus ID: 15337292
This paper presents an intuitive and analytical model of how the federal safety net affects banks' cost of funds. Emphasis is…
Expand
1933
1933
Ionospheric Investigations in High Latitudes
E. Appleton
,
R. Naismith
,
G. Builder
Nature
1933
Corpus ID: 4138587
IN connexion with the International Polar Year 1932-33, a series of wireless observations has been made at Tromsô (lat. 690 39.8…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE