In x86, this concept is specified by bits 12 and 13 of the FLAGS register. In schemes managing this concept, one process can exploit a system by tricking a “confused deputy.” In Linux, special examples of this concept include the “sticky bit” and SUID (“S-U-I-D”), which are assigned to directories and executables, respectively. Levels of this concept are organized into concentric rings in the protection ring model, in which this concept is highest in ring zero. The principle that processes are given the least amount of this concept necessary to accomplish desired tasks underpins capability-based security. Commands requiring an escalated level of this concept can be run with “sudo.” Kernel mode and user mode are levels of, for 10 points, what concept specifying what a user is allowed to do? ■END■