Privilege revocation (computing)

Known as: Privilege revocation 
Privilege revocation is the act of an entity giving up some, or all of, the privileges they possess, or some authority taking those (privileged… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2006-2018
01220062018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches… (More)
  • figure 1
  • figure 2
Is this relevant?
2017
2017
Group signature schemes enable anonymous-yetaccountable communications. Such a capability is extremely useful for applications… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2017
2017
Chu et al. (ASIACCS 2012) proposed group signature with time-bound keys (GS-TBK) where each signing key is associated to an… (More)
  • table 1
  • figure 1
  • figure 3
  • figure 4
  • table 2
Is this relevant?
2017
2017
While cloud services are becoming more and more widely used, their security issues are noticed by researchers. Multimedia data… (More)
  • figure 1
  • figure 2
Is this relevant?
2017
2017
Cloud computing has brought much convenience to human life, however, how to realize secure and fine-grained authentication of the… (More)
  • table I
  • figure 1
Is this relevant?
2016
2016
The advent of cloud computing motivates business organizations to migrate their complex data management systems from local… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
By attaching RFID tags to products, supply chain participants can identify products and create product data to record the product… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
By attaching RFID tags to products, supply chain participants can identify products and create product data to record the product… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
2011
2011
Intrusion prevention and detection in physical access control systems relying on radio frequency identification (RFID) can be… (More)
  • figure 1
  • figure 2
Is this relevant?
2006
2006
We present a novel way to implement the secret-sharing-based family of revocation schemes of Naor and Pinkas [2003]. The basic… (More)
Is this relevant?