Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,109,812 papers from all fields of science
Search
Sign In
Create Free Account
Privilege revocation (computing)
Known as:
Privilege revocation
Privilege revocation is the act of an entity giving up some, or all of, the privileges they possess, or some authority taking those (privileged…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Computer program
Defensive programming
Entity
Nobody (username)
Expand
Broader (1)
Information theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability
Zhenhua Liu
,
Jing Xu
,
Yan Liu
,
Baocang Wang
IEEE Access
2019
Corpus ID: 174820709
Ciphertext-policy attribute-based encryption (CP-ABE) can offer fine-grained access control over encrypted data, which is…
Expand
2017
2017
Home Rule in an Era of Local Environmental Innovation
S. Fox
2017
Corpus ID: 157523436
As 2016’s national election made clear, striking ideological differences between cities and their surrounding states exist in…
Expand
2016
2016
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing
Rohit Ahuja
,
Sraban Kumar Mohanty
,
K. Sakurai
Asia Joint Conference on Information Security
2016
Corpus ID: 7152265
The advent of cloud computing motivates business organizations to migrate their complex data management systems from local…
Expand
Review
2015
Review
2015
A NOVEL APPROACH FOR REVOCABLE MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD
V. Rao
2015
Corpus ID: 21454136
The number of user in cloud computing are increasing tremendously due to its advantage of providing flexible storage requirement…
Expand
2014
2014
Scalable Data Access Control in RFID-Enabled Supply Chain
Saiyu Qi
,
Yuanqing Zheng
,
Mo Li
,
Yunhao Liu
,
Jinli Qiu
IEEE International Conference on Network…
2014
Corpus ID: 9615356
By attaching RFID tags to products, supply chain participants can identify products and create product data to record the product…
Expand
2013
2013
PENGGUNAAN TATO LAMBANG KERATON YOGYAKARTA (HOBO) SEBAGAI DUKUNGAN STATUS KEISTIMEWAAN YOGYAKARTA(Studi Eksploratori Tato Lambang Keraton Yogyakarta Pada Festival Tato Istimewa 2011)
Tripamungkas
,
Mikhael Resi
2013
Corpus ID: 190021824
ABSTRAK Di Yogyakarta pada tanggal 1 sampai 2 Juli 2011 yang lalu diadakan event Festival Tattoo Istimewa. Pada salah satu sesi…
Expand
2012
2012
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL
K. Sohr
,
Mirco Kuhlmann
,
Martin Gogolla
,
Hongxin Hu
,
Gail-Joon Ahn
Information and Software Technology
2012
Corpus ID: 3161260
2011
2011
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
M. Au
,
Patrick P. Tsang
,
Apu Kapadia
TSEC
2011
Corpus ID: 15116362
Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses…
Expand
2011
2011
Graceful privilege reduction in RFID security
Matthew Butler
,
P. Hawrylak
,
John Hale
Cyber Security and Information Intelligence…
2011
Corpus ID: 6982083
Intrusion prevention and detection in physical access control systems relying on radio frequency identification (RFID) can be…
Expand
2009
2009
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data
Ioannis Agrafiotis
,
S. Creese
,
M. Goldsmith
,
N. Papanikolaou
PrimeLife
2009
Corpus ID: 14121841
We introduce a revocation model for handling personal data in cyberspace. The model is motivated by a series of focus groups…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE