The code provided in this post can be used in different ways. Alternatively, you can use one of the low by functions to run only a part of the SIFT algorithm for scale, to compute the SIFT descriptors of custom keypoints. In space to search for image blobs at multiple scale, the Object detector construct a scale space, defined as singld. Instance the Gaussian kernel..
If you try to set a invalid permission combination on the checkboxes, the powerful Access Control Entry editor is shown where you can configure the regarding ACE in detail. Please note that the propagation could be blocked somewhere in the subtree of an object. Just deactivate the Inherit permissions from parent objects option.
If you do that, you can choose whether you keep all the inherited entries as real entries, or if you want to remove all the inherited entries from the ACL. You can easily change the propagation value.