• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 11,126
Next 10 →

Table Stack Permissions

in Mondrian memory protection
by Krste Asanović, Emmett Jethro Witchel, Emmett Jethro Witchel 2002
Cited by 52

Table 1. Permission relation

in Weak Sequential Composition in Process Algebras
by Arend Rensink And, Arend Rensink, Heike Wehrheim 1994
Cited by 13

Table Stack Permissions

in Mondrix: Memory isolation for Linux using Mondriaan memory protection
by Emmett Witchel, Krste Asanović 2005
Cited by 4

Table Stack Permissions

in Mondrix: Memory isolation for Linux using Mondriaan memory protection
by Emmett Witchel, Junghwan Rhee, Krste Asanović 2005
Cited by 4

Table 3. Access Permissions

in unknown title
by unknown authors 1998

Table 1 Java Permissions

in Low-Level Code Safety Mechanisms 127
by High-level Code Safety 2005

Table 1. Permission Elements

in unknown title
by unknown authors
"... In PAGE 35: ...Table1... ..."

Table 2: Masking of Permissions

in This paper discusses file system Access Control Lists
by unknown authors

Table 1 Permission assignments for the example.

in SESAME: Scalable, Environment Sensitive Access Management Engine
by Guangsen Zhang, Manish Parashar
"... In PAGE 6: ... There are no inherent constraints on the number of roles and permissions, or on the relationships betweens the roles or permissions. To illus- trate our implementation, consider a simple example with a single user with three roles and a Grid resource with three permissions, as shown in Table1 and 2 respectively. The role and permission hierarchies for this example are shown in figure 9.... ..."

Table 3: Example of an administrative permission

in An Administration Concept for the Enterprise Role-Based Access Control Model
by Axel Kern, Andreas Schaad, Jonathan Moffett
"... In PAGE 4: ...Table 3: Example of an administrative permission Table3 shows an example permission. It authorises an ad- ministrator to view and change users, assign and deassign roles, and view roles and their assignments for the cost cen- ters 521, 5211 and 523 from the scope hierarchy in figure 4.... ..."
Next 10 →
Results 11 - 20 of 11,126
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University