Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,304 papers from all fields of science
Search
Sign In
Create Free Account
Privilege revocation (computing)
Known as:
Privilege revocation
Privilege revocation is the act of an entity giving up some, or all of, the privileges they possess, or some authority taking those (privileged…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Computer program
Defensive programming
Entity
Nobody (username)
Expand
Broader (1)
Information theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Bona Fide and Revocation of Withdrawal: How Article 50 TEU Handles the Potential Abuse of a Unilateral Revocation of Withdrawal
D. Benrath
2018
Corpus ID: 158377344
One of the major unsolved issues regarding art.50 TEU is the permissibility of unilateral revocation of withdrawal. In this…
Expand
2016
2016
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing
Rohit Ahuja
,
Sraban Kumar Mohanty
,
K. Sakurai
Asia Joint Conference on Information Security
2016
Corpus ID: 7152265
The advent of cloud computing motivates business organizations to migrate their complex data management systems from local…
Expand
Review
2015
Review
2015
A NOVEL APPROACH FOR REVOCABLE MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD
V. Rao
2015
Corpus ID: 21454136
The number of user in cloud computing are increasing tremendously due to its advantage of providing flexible storage requirement…
Expand
2014
2014
Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage
Weiyu Jiang
,
Zhan Wang
,
Limin Liu
,
Neng Gao
Security and Privacy in Communication Networks
2014
Corpus ID: 27858360
To protect sensitive data from unauthorized access, encrypting data at the user end before outsourcing them to the cloud storage…
Expand
2014
2014
Anonymously Share Data on Group Signature in the Large Groups of Cloud
G. Rani
2014
Corpus ID: 212505744
— we have a tendency to propose a secure multi-owner information sharing theme. It implies that any user within the cluster will…
Expand
2013
2013
PENGGUNAAN TATO LAMBANG KERATON YOGYAKARTA (HOBO) SEBAGAI DUKUNGAN STATUS KEISTIMEWAAN YOGYAKARTA(Studi Eksploratori Tato Lambang Keraton Yogyakarta Pada Festival Tato Istimewa 2011)
Tripamungkas
,
Mikhael Resi
2013
Corpus ID: 190021824
ABSTRAK Di Yogyakarta pada tanggal 1 sampai 2 Juli 2011 yang lalu diadakan event Festival Tattoo Istimewa. Pada salah satu sesi…
Expand
2012
2012
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL
K. Sohr
,
Mirco Kuhlmann
,
Martin Gogolla
,
Hongxin Hu
,
Gail-Joon Ahn
Information and Software Technology
2012
Corpus ID: 3161260
2012
2012
A Visa to "Snitch": An Addendum to Cox and Posner
E. Brown
2012
Corpus ID: 73523694
Cox and Posner's landmark contribution is the first article to have highlighted the challenges of information asymmetry in…
Expand
2008
2008
An Extended Permission-Based Delegation Authorization Model
Zhikun Zhang
,
Jianguo Xiao
,
Hanyi Li
,
Youping Geng
International Conference on Computer Science and…
2008
Corpus ID: 18767228
The characteristics of delegation are analyzed and defined in this paper, including time, totality, level, multi-delegation…
Expand
1998
1998
Certi cate Revocation and Certi cate
UpdateMoni
,
Naor
,
Kobbi
,
NissimDept
1998
Corpus ID: 15948207
A new solution is suggested for the problem of cer-tiicate revocation. This solution represents Cer-tiicate Revocation Lists by…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE