Issues in Centralized File Systems
Security
Protection Matrix
Access Control Lists
Capabilities
usr1
usr n
file 1
file 2
file m
...
rw
r
rwx
-
-
rw
Previous slide
Next slide
Back to first slide
View graphic version