How are file sharing and protection implemented, Operating System

Assignment Help:

How are file sharing and protection implemented?

To execute file sharing and protection the system have to maintain more file and directory attributes than are needed on a single user system. The most generally used concept is file or directory, owner or and group. The owner is the user who are able to change attributes and who can grant access. The owner as well has the most control over the file.

The group attribute defines a subset of users who are able to share access to the file. The group IDs of a file (or directory) and owner are stored with the other file attributes. When a user desires an operation on a file then the user ID can be compared with the owner attribute to determine if the requesting user is the owner of the file. Similarly, the group IDs is able to be compared. The result point to which permissions are applicable. The system after that applies those permissions to the requested operation and allows or denies it.

 

 


Related Discussions:- How are file sharing and protection implemented

Convert the hex to binary, Convert the following from hex to binary and dra...

Convert the following from hex to binary and draw it on the memory map.     RAM    = 0000 -> 00FF     EPROM = FF00  -> FFFF Answer:   0000  0000 0000  0000 (0)    RAM sta

How is process management done in multiprocessing systems, How is process m...

How is process management done in multiprocessing systems ? There are two accost for the process management in multiprocessor systems. Master-slave configuration Sy

What does verification represent, What does Verification represent? Ver...

What does Verification represent? Verification shows the set of activities that are carried out to confirm that the software correctly executes the specific functionality.

Define buffering, Define buffering. A buffer is a memory area that keep...

Define buffering. A buffer is a memory area that keeps data whereas they are transferred among two devices or among a device and an application. Buffering is done for three rea

DOS, Ask question #Minimum 500 words accepted#

Ask question #Minimum 500 words accepted#

Action taken by the operating system when a page fault occur, Q. Under what...

Q. Under what conditions do page faults occur? Explain the actions taken by the operating system when a page fault occurs. Answer: A page fault take places when an access to

Explain medium term scheduling, Medium term scheduling This is componen...

Medium term scheduling This is component of the swapping function. Usually the swapping in decision is based on the need to manage the degree of multiprogramming. At a system t

Briefly discuss on i/o hardware, Briefly discuss on I/O hardware? A con...

Briefly discuss on I/O hardware? A controller is a collection of electronics that can operate a port, a bus, or a device. A serial-port controller is an easy controller. It is

What is an effector process, What is an effector process? The effector ...

What is an effector process? The effector process is a method that verifies itself.The effector process exists in particular criteria.

Modern os, importance of Operating system in modern computers. Also explain...

importance of Operating system in modern computers. Also explain various functions & types of operating systems

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd