Skip to search formSkip to main contentSkip to account menu

Protection mechanism

Known as: Computer protection, Protection, Protection mechanisms 
In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
With the rapid deployment of M2M services, countless smart “things” with sensing and communication capabilities are collecting… 
2009
2009
The adoption of AUTOSAR in the development of automotive electronics can increase the portability and reuse of functional… 
Highly Cited
2007
Highly Cited
2007
In present-day electronic systems, application subsystems from different vendors and with different criticality levels are… 
2006
2006
The effects of the passage of forwarders on soil and damage to spruce root systems along an experimental trail were studied. The… 
2004
2004
Smart cards are one of the smallest computing platforms in use today. They are used in an increasing number of security… 
Highly Cited
2003
Highly Cited
2003
The probability of transient faults increases with the evolution of technologies. There is a corresponding increased demand for… 
2003
2003
The present paper addresses privacy issues in electronic audio/video content distribution. It introduces an identity-based rights… 
1998
1998
We deal with the question of how to maintain security of confidential information in a database while answering as many queries… 
1986
1986
Polypeptides traverse the mitochondri;d envelope in an extended state .Io:tchinl Rassow ~. Franz-tih'ich tiat'tl t, licrnard…