File system permissions

Known as: File Permissions, Read-only access, Read rights 
Most file systems have methods to assign permissions or access rights to specific users and groups of users. These systems control the ability of the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1986-2017
051019862017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Identifying irregular file system permissions in large, multi-user systems is challenging due to the complexity of gaining… (More)
Is this relevant?
2016
2016
It is well established that file system permissions in large, multi-user environments can be audited to identify vulnerabilities… (More)
  • table 1
  • table 2
  • figure 2
  • figure 1
  • table 4
Is this relevant?
2014
2014
Mobile devices are fast becoming critical information management tools often storing a range of personal and corporate… (More)
Is this relevant?
2013
2013
Administrating and monitoring New Technology File System (NTFS) permissions can be a cumbersome and convoluted task. In today’s… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
2011
2011
Negative-bias temperature instability (NBTI) and positive-bias temperature instability (PBTI) weaken PFET and NFET over the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
In this paper, we present a visual representation of access control permissions in a standard hierarchical file system. Our… (More)
Is this relevant?
2005
2005
Most desktop search systems maintain per-user indices to keep track of file contents. In a multi-user environment, this is not a… (More)
Is this relevant?
2004
2004
This paper presents Kosha, a peer-to-peer (p2p) enhancement for the widely-used Network File System (NFS). Kosha harvests… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
1998
1998
The role metaphor in Role Based Access Control (RBAC) is particularly powerful in its ability to express access policy in terms… (More)
  • figure 1
  • table 1
Is this relevant?
1997
1997
Sharing network data between NT and UNIX systems is becoming increasingly important as NT moves into areas previously serviced… (More)
Is this relevant?