Useful Links
1. Introduction to File Systems
2. File System Architecture
3. File Concepts
4. Directory Systems and Naming
5. Storage Device Organization
6. On-Disk File System Implementation
7. File System Performance
8. File System Reliability and Recovery
9. Security and Access Control
10. Traditional File System Types
11. Specialized File Systems
12. Advanced File System Concepts
  1. Computer Science
  2. Operating Systems

File Systems

1. Introduction to File Systems
2. File System Architecture
3. File Concepts
4. Directory Systems and Naming
5. Storage Device Organization
6. On-Disk File System Implementation
7. File System Performance
8. File System Reliability and Recovery
9. Security and Access Control
10. Traditional File System Types
11. Specialized File Systems
12. Advanced File System Concepts
  1. Security and Access Control
    1. Access Control Models
      1. Discretionary Access Control
        1. User/Group/Other Model
          1. Permission Bits
            1. Access Control Lists
            2. Mandatory Access Control
              1. Security Labels
                1. Multi-Level Security
                2. Role-Based Access Control
                  1. Role Definitions
                    1. Permission Assignment
                  2. Permission Systems
                    1. Basic Permissions
                      1. Read Permission
                        1. Write Permission
                          1. Execute Permission
                          2. Special Permissions
                            1. Set User ID
                              1. Set Group ID
                                1. Sticky Bit
                                2. Extended Permissions
                                  1. Fine-Grained Access Control
                                    1. Attribute-Based Permissions
                                  2. File System Security Features
                                    1. Encryption
                                      1. Transparent File System Encryption
                                        1. Per-File Encryption
                                          1. Key Management
                                          2. Auditing
                                            1. Access Logging
                                              1. Security Event Monitoring
                                              2. Secure Deletion
                                                1. Data Overwriting
                                                  1. Metadata Sanitization

                                              Previous

                                              8. File System Reliability and Recovery

                                              Go to top

                                              Next

                                              10. Traditional File System Types

                                              © 2025 Useful Links. All rights reserved.

                                              About•Bluesky•X.com