All Fields
Computer Science
Medicine
FAQ
Contact
Sign in
File system permissions
Known as:
File Permissions
, Read-only access
, Read rights
Â
(More)
Most file systems have methods to assign permissions or access rights to specific users and groups of users. These systems control the ability of the…Â
(More)
Wikipedia
Topic mentions per year
Topic mentions per year
1986-2017
0
5
10
1986
2017
Related topics
Related topics
50 relations
"Classic" Mac OS
Access control list
Bit field
Chmod
(More)
Related mentions per year
Related mentions per year
1936-2018
1940
1960
1980
2000
2020
File system permissions
Disk partitioning
Computer file
Vulnerability
Portable Document Format
Information security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Auditing file system permissions using association rule mining
Simon Parkinson
,
V. Somaraki
,
R. Ward
Expert Syst. Appl.
2016
Identifying irregular file system permissions in large, multi-user systems is challenging due to the complexity of gaining…Â
(More)
Is this relevant?
2016
2016
Identification of irregularities and allocation suggestion of relative file system permissions
Simon Parkinson
,
Andrew Crampton
J. Inf. Sec. Appl.
2016
It is well established that file system permissions in large, multi-user environments can be audited to identify vulnerabilities…Â
(More)
Is this relevant?
2014
2014
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud
Quang Do
,
Ben Martini
,
Kim-Kwang Raymond Choo
2014 IEEE 13th International Conference on Trust…
2014
Mobile devices are fast becoming critical information management tools often storing a range of personal and corporate…Â
(More)
Is this relevant?
2013
2013
A Novel Software Tool for Analysing NT File System Permissions
Simon Parkinson
,
Andrew Crampton
ArXiv
2013
Administrating and monitoring New Technology File System (NTFS) permissions can be a cumbersome and convoluted task. In today’s…Â
(More)
Is this relevant?
2011
2011
Impacts of NBTI/PBTI on Timing Control Circuits and Degradation Tolerant Design in Nanoscale CMOS SRAM
Hao-I Yang
,
Shyh-Chyi Yang
,
Wei Hwang
,
Ching-Te Chuang
IEEE Transactions on Circuits and Systems I…
2011
Negative-bias temperature instability (NBTI) and positive-bias temperature instability (PBTI) weaken PFET and NFET over the…Â
(More)
Is this relevant?
2008
2008
Effective Visualization of File System Access-Control
Alexander Heitzmann
,
Bernardo Palazzi
,
Charalampos Papamanthou
,
Roberto Tamassia
VizSEC
2008
In this paper, we present a visual representation of access control permissions in a standard hierarchical file system. Our…Â
(More)
Is this relevant?
2005
2005
A Security Model for Full-Text File System Search in Multi-User Environments
Stefan Büttcher
,
Charles L. A. Clarke
FAST
2005
Most desktop search systems maintain per-user indices to keep track of file contents. In a multi-user environment, this is not a…Â
(More)
Is this relevant?
2004
2004
Kosha: A Peer-to-Peer Enhancement for the Network File System
Ali Raza Butt
,
Troy A. Johnson
,
Yili Zheng
,
Y. Charlie Hu
Journal of Grid Computing
2004
This paper presents Kosha, a peer-to-peer (p2p) enhancement for the widely-used Network File System (NFS). Kosha harvests…Â
(More)
Is this relevant?
1998
1998
Managing Role/Permission Relationships Using Object Access Types
John F. Barkley
,
Anthony Cincotta
ACM Workshop on Role-Based Access Control
1998
The role metaphor in Role Based Access Control (RBAC) is particularly powerful in its ability to express access policy in terms…Â
(More)
Is this relevant?
1997
1997
Merging NT and UNIX Filesystem Permissions
Dave Hitz
,
Bridget Allison
,
Andrea Borr
,
Rob Hawley
,
Mark Muhlestein
1997
Sharing network data between NT and UNIX systems is becoming increasingly important as NT moves into areas previously serviced…Â
(More)
Is this relevant?