Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,515,997 papers from all fields of science
Search
Sign In
Create Free Account
Write Permission
Permission that allows a user or program the ability to view information, write new information, and modify information.
National Institutes of Health
Create Alert
Alert
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
DATA: Survey of Data Acquisition Techniques on Android Devices
M. Shahbaz
,
Awais Bilal
,
Usman Ahmad
2017
Corpus ID: 212552699
The usage of Android smartphones as cellular mobile phones is very popular and dramatically increasing around the globe because…
Expand
2017
2017
25 : 2 On Symbolic Heaps Modulo Permission
Stephane Demri
,
É. Lozes
,
D. Lugiez
2017
Corpus ID: 42836300
We address the entailment problem for separation logic with symbolic heaps admitting list predicates and permissions for memory…
Expand
2015
2015
Using Shadow Page Cache to Improve Isolated Drivers Performance
Haoquiang Zheng
,
Xiaoshe Dong
,
Endong Wang
,
Baoke Chen
,
Zhengdong Zhu
,
Chengzhe Liu
TheScientificWorldJournal
2015
Corpus ID: 15707238
With the advantage of the reusability property of the virtualization technology, users can reuse various types and versions of…
Expand
2015
2015
DECENTRALIZED ACCESS CONTROL WITH ADVANCED ENCRYPTION STANDARD AND ANONYMOUS AUTHETICATION FOR USERS IN CLOUD
T. Yawanikha
,
Bavithra Madhuranjani
,
S. Ganapathiammal
2015
Corpus ID: 49672420
Cloud computing is one of the recent trends emerging in the field of Information Technology, it mainly focuses on global access…
Expand
2014
2014
Permissions of the shared content
アリシア チェン
2014
Corpus ID: 67002587
Various embodiments of the disclosed technology may set the permissions for the content to be shared via the online content…
Expand
2005
2005
Another Factorial File Compression Experiment Using SAS � and UNIX Compression Algorithms
A. J. Wilcox
2005
Corpus ID: 1641756
Continuing experimental work on SAS data set compression presented at NESUG in 2004, I designed another two-factor factorial…
Expand
2004
2004
Evaluation, Implementation and Performance of Write Permission Caching in the DSZOOM System
Håkan Zeffer
,
Z. Radovic
,
Oskar Grenholm
,
Erik Hagersten
2004
Corpus ID: 2052471
Fine-grained software-based distributed shared memory (SW-DSM) systems typically maintain coherence with in-line checking code at…
Expand
2004
2004
Integrating Discretionary and Mandatory Access Controls
Jon A. Solworth
2004
Corpus ID: 14147585
Traditionally DACs and MACs have been implemented on orthogonal axes: For an operation to be performed, both MAC and DAC access…
Expand
2004
2004
Method and device for bus coupling safety-relevant processes
Heinz-Carsten Landwehr
,
Viktor Oster
,
Rainer Esch
2004
Corpus ID: 64876655
The invention relates to a method and an adapted device for performing the method for single-channel bus coupling of safety…
Expand
1988
1988
Report: Quest — A security auditing tool
Sharon A. Kapilow
,
Mikhail Cherepov
AT&T Technical Journal
1988
Corpus ID: 44974929
Quest is a security package for assisting system administrators of UNIX® systems. It consists of a series of components that…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE