Table of ContentsFile Systems Implementing Directories Directory Entry CP/M MS-DOS MS-DOS (II) UNIX Disk Space Management Block Size Keeping Track of Free Blocks File System Reliability Backups File System Consistency File System Performance File System Performance (II) Security Environment Security Security (II) Security (III) Security Flaws Generic Security Attacks Viruses Design Principles for Security User Authentication User Authentication Protection Mechanisms Protection Domains Protection Domains (II) Access Control Lists Capabilities List Covert Channels |
Author: Gary L. Burt
Email: burt@umbc Home Page: www.cs.umbc.edu/~burt |