Advertisement

File Management

  • Colin J. Theaker
  • Graham R. Brookes
Chapter
Part of the Macmillan Computer Science Series book series (COMPSS)

Abstract

Most users of a computer utilise the facilities of the file system without being aware of the complexity that lies behind it. In general, this complexity does not result because of the nature of the facilities provided, rather because of the need to ensure the security and integrity of the file system. It is usually this aspect of an operating system’s design which has the greatest impact on users, and which also has the greatest visibility when it fails to function as desired.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

7.7 References and bibliography

  1. D.E. Denning and P.J. Denning (1979). ‘Data Security’, ACM Computing Surveys, Vol. 11, pp. 227–49.CrossRefGoogle Scholar
  2. E.I. Organick (1972). The Multics System: An Examination of its Structure, MIT Press, Cambridge, Mass.Google Scholar

Copyright information

© Colin J. Theaker and Graham R. Brookes 1993

Authors and Affiliations

  • Colin J. Theaker
    • 1
  • Graham R. Brookes
    • 2
  1. 1.Staffordshire UniversityUK
  2. 2.Hull UniversityUK

Personalised recommendations