Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,533,787 papers from all fields of science
Search
Sign In
Create Free Account
Protection mechanism
Known as:
Computer protection
, Protection
, Protection mechanisms
In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Computer science
Operating system
Robert M. Graham
Separation of mechanism and policy
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Privacy in machine-to-machine communications A state-of-the-art survey
Yi Cheng
,
M. Näslund
,
G. Selander
,
Eva Fogelstrom
International Conference on Conceptual Structures
2012
Corpus ID: 7460188
With the rapid deployment of M2M services, countless smart “things” with sensing and communication capabilities are collecting…
Expand
2009
2009
Time and memory tradeoffs in the implementation of AUTOSAR components
A. Ferrari
,
M. Natale
,
Giacomo Gentile
,
Giovanni Reggiani
,
Paolo Gai
Design, Automation & Test in Europe Conference…
2009
Corpus ID: 951038
The adoption of AUTOSAR in the development of automotive electronics can increase the portability and reuse of functional…
Expand
Highly Cited
2007
Highly Cited
2007
A Comparison of Partitioning Operating Systems for Integrated Systems
B. Leiner
,
M. Schlager
,
R. Obermaisser
,
B. Huber
International Conference on Computer Safety…
2007
Corpus ID: 16458852
In present-day electronic systems, application subsystems from different vendors and with different criticality levels are…
Expand
2006
2006
Roots under the load of heavy machinery in spruce trees
N. Nadezhdina
,
J. Cermak
,
+5 authors
E. Pokorný
European Journal of Forest Research
2006
Corpus ID: 46408160
The effects of the passage of forwarders on soil and damage to spruce root systems along an experimental trail were studied. The…
Expand
2006
2006
Photonic crystal type structures of biological origin: Structural and spectral characterization
K. Kertész
,
Z. Bálint
,
+4 authors
L. Biró
2006
Corpus ID: 55955377
2004
2004
High level fault injection for attack simulation in smart cards
K. Rothbart
,
U. Neffe
,
C. Steger
,
R. Weiss
,
E. Rieger
,
Andreas Mühlberger
Asian Test Symposium
2004
Corpus ID: 20742557
Smart cards are one of the smallest computing platforms in use today. They are used in an increasing number of security…
Expand
Highly Cited
2003
Highly Cited
2003
Multi-Level Fault Injections in VHDL Descriptions: Alternative Approaches and Experiments
R. Leveugle
,
K. Hadjiat
Journal of electronic testing
2003
Corpus ID: 27584885
The probability of transient faults increases with the evolution of technologies. There is a corresponding increased demand for…
Expand
2003
2003
Privacy in an identity-based DRM system
Claudine Conrado
,
F. Kamperman
,
G. Schrijen
,
W. Jonker
14th International Workshop on Database and…
2003
Corpus ID: 5439567
The present paper addresses privacy issues in electronic audio/video content distribution. It introduces an identity-based rights…
Expand
1998
1998
Interval Protection of Confidential Information in a Database
R. Gopal
,
Paulo B. Góes
,
R. Garfinkel
INFORMS journal on computing
1998
Corpus ID: 12474714
We deal with the question of how to maintain security of confidential information in a database while answering as many queries…
Expand
1986
1986
2. Materials and Methods
M. Strohm
1986
Corpus ID: 88750205
Polypeptides traverse the mitochondri;d envelope in an extended state .Io:tchinl Rassow ~. Franz-tih'ich tiat'tl t, licrnard…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required