Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,168,522 papers from all fields of science
Search
Sign In
Create Free Account
Umask
Known as:
File mode creation mask
, Mask (disambiguation)
In computing, umask is a command that determines the settings of a mask that controls how file permissions are set for newly created files. It also…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Binary code
Chmod
Daemon (computing)
File system permissions
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Allowing Inheritable NFSv4 Access Control Entries to Override the Umask
J. Fields
,
Andreas Gruenbacher
Request for Comments
2017
Corpus ID: 20416870
In many environments, inheritable NFSv4 Access Control Entries (ACEs) can be rendered ineffective by the application of the per…
Expand
2016
2016
Allowing inheritable NFSv4 ACLs to override the umask
Andreas Gruenbacher
,
J. Fields
2016
Corpus ID: 63713656
In some environments, inheritable NFSv4 ACLs can be rendered ineffective by the application of the per-process umask. This is…
Expand
2015
2015
Defense method and apparatus for malicious clicks
李晓刚
,
霍庆
,
周杰
,
郭乐
,
李云龙
,
卢珺珈
2015
Corpus ID: 133252094
The present invention discloses a method and apparatus for prevention of malicious clicks. The method comprising: obtaining mask…
Expand
2012
2012
Automating RPM Creation from a Source Code Repository
Travis W. Parker
,
P. Ritchey
2012
Corpus ID: 60426246
Abstract : The use of a source code repository while writing and maintaining a software project has become a modern standard…
Expand
2011
2011
Invalid values accepted for file-umask and dir-umask parameters when creating or modifying CIFS shares
maryo
,
Berriman
2011
Corpus ID: 64921703
2007
2007
Chip-interleaved self-encoded multiple access with iterative detection in fading channels
Youn Seok Kim
,
W. Jang
,
Y. Kong
,
L. Nguyen
Journal of Communications and Networks
2007
Corpus ID: 17631147
We propose to apply chip interleaving and iterative detection to self-encoded multiple access (SEMA) communications. In SEMA, the…
Expand
2007
2007
Detection of Hidden Software Functionality
Jostein Jensen
2007
Corpus ID: 109183489
Downloading software from unknown sources constitutes a great risk. Studies have described file-sharing networks where the…
Expand
2000
2000
Respiratory mask for supplying a respiratory gas to a user mask
Achim Biener
,
B. Lang
2000
Corpus ID: 197427664
Respirator for supplying a respiratory gas to a person, with a device sealing lip (2) for sealing a contact zone mask, a base…
Expand
Review
1999
Review
1999
An Overview of GPS Augmentation Systems
M. Petovello
,
G. Lachapelle
,
P. Fenton
1999
Corpus ID: 127951580
Abstract : The mature satellite-based navigation systems that are now available (e.g., GPS) have provided adequate positioning…
Expand
1989
1989
The UNIX File System
Andreas J. Pilavakis
1989
Corpus ID: 63286358
This chapter will describe the basic structure of the UNIX file system, and the different types of files that may be used. In…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE