SlideShare a Scribd company logo
Protection, Directory
Implementation
By
C.Rajeswari
M.Sc (info.tech),
Nadar saraswathi college of arts and science,
theni.
Protection
 When information is stored in a computer system, we
want to keep it safe from physical damage(reliability)
and improper access(protection).
 Protection can be provided in many ways.
 For a small single-user system, we might provide
protection by physically removing the floppy disks and
locking them in a desk drawer or file cabinet.
Continue…
I. Types of access:
 The need to protect files is a direct result of the ability to access files.
 Several different types of operations may be controlled:
Read : Read from the file.
Write : Write or rewrite the file.
Execute : Load the file into memory and execute it
Append : Write new information at the end of the file.
Delete : Delete the file and free its space for possible reuse.
List : List the name and attributes of the file.
Continue…
II. Access control:
 The most common approach to the protection problem is to make
access dependent on the identity of the user.
 To condense the length of the access-control list, many systems
recognize three classifications of users in connection with each file:
Owner : The user who created the file is the owner.
Group : A set of users who are sharing the file and need
similar access is a group, or work group.
Universe : All other users in the system constitute the universe.
Continue…
III. Other protection approaches:
 Another approach to the protection problem is to associate a password
with each file. Just as access to the computer system is often controlled
by a password, access to each file can be controlled in the same way.
 The IBMVM/CMS operating system allows three passwords for a
minidisk-one each for read, write, and multiwrite access.
 Some single-user operating systems--such as MS-DOS and earlier
versions of file protection.
 Protection mechanisms must be retrofitted into them.
Directory Implementation
 The selection of directory-allocation and directory-
management algorithms significantly affects the
efficiency, performance, and reliability of the file
system.
 In trade-offs involved in choosing one of these
algorithms.
Continue…
I. Linear List:
 The simplest method of implementing a directory is to use a
linear list of file names with pointers to the data blocks.
 This method is simple to program but time-consuming to
execute.
 Linear search time
 Could keep ordered alphabetically via linked list or use B+
tree
Continue…
Advantage:
 It also be used to decrease the time required to delete file
 We can mark blank space and attached to free list
Disadvantage:
 Finding a file requires a linear search
 Access is very slow
Continue…
II. Hash Table:
 Another data structure used for a file directory is a hash table.
 A linear list stores the directory entries, but a hash data structure is
also used.
 Insertion and deletion are also fairly straightforward.
 although some provision must be made for collisions-situations in
which two file names hash to the same location.
 Drawback
 Only good if entries are fixed size, or use chained-overflow method
THANKING YOU

More Related Content

PDF
File system in operating system e learning
PPTX
Introduction to File System
PDF
File structure
DOCX
File system
PPTX
File Protection
PPT
Operating system- AARAMBH PANDEY
PPTX
Network security
PPT
Download It
File system in operating system e learning
Introduction to File System
File structure
File system
File Protection
Operating system- AARAMBH PANDEY
Network security
Download It

Similar to Protection, directory implementation (20)

PPTX
Oerating system project
PPTX
File management
PPTX
Report blocking ,management of files in secondry memory , static vs dynamic a...
PDF
oslectureset7.pdf
PPTX
File System.pptx
PPTX
File System operating system operating system
PPTX
PDF
File Systems
PPTX
Unit 5.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
PPTX
File management
PPTX
CHAPTER 1 - Operating systems File System Interface.pptx
PPTX
UNIT7-FileMgmt.pptx
PPTX
File System Interface
PPT
file management_osnotes.ppt
PPT
PPT
Chapter 3 part 1
PPT
Operating System
DOCX
File Management in Operating System.docx
PPT
Unit 3 file management
PPT
operating system File - System Interface
Oerating system project
File management
Report blocking ,management of files in secondry memory , static vs dynamic a...
oslectureset7.pdf
File System.pptx
File System operating system operating system
File Systems
Unit 5.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
File management
CHAPTER 1 - Operating systems File System Interface.pptx
UNIT7-FileMgmt.pptx
File System Interface
file management_osnotes.ppt
Chapter 3 part 1
Operating System
File Management in Operating System.docx
Unit 3 file management
operating system File - System Interface
Ad

More from rajshreemuthiah (20)

PPTX
PPTX
PPTX
PPTX
polymorphism
PPTX
solutions and understanding text analytics
PPTX
interface
PPTX
Testing &ampdebugging
PPTX
concurrency control
PPTX
Education
PPTX
Formal verification
PPTX
Transaction management
PPTX
Multi thread
PPTX
System testing
PPTX
software maintenance
PPTX
exception handling
PPTX
e governance
PPTX
recovery management
PPTX
Implementing polymorphism
PPSX
Buffer managements
PPTX
os linux
polymorphism
solutions and understanding text analytics
interface
Testing &ampdebugging
concurrency control
Education
Formal verification
Transaction management
Multi thread
System testing
software maintenance
exception handling
e governance
recovery management
Implementing polymorphism
Buffer managements
os linux
Ad

Recently uploaded (20)

PDF
August Patch Tuesday
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Tartificialntelligence_presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
A Presentation on Artificial Intelligence
PPTX
TLE Review Electricity (Electricity).pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
OMC Textile Division Presentation 2021.pptx
August Patch Tuesday
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A Presentation on Touch Screen Technology
Heart disease approach using modified random forest and particle swarm optimi...
Getting Started with Data Integration: FME Form 101
Tartificialntelligence_presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
1 - Historical Antecedents, Social Consideration.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A novel scalable deep ensemble learning framework for big data classification...
A Presentation on Artificial Intelligence
TLE Review Electricity (Electricity).pptx
A comparative study of natural language inference in Swahili using monolingua...
SOPHOS-XG Firewall Administrator PPT.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Mushroom cultivation and it's methods.pdf
WOOl fibre morphology and structure.pdf for textiles
Programs and apps: productivity, graphics, security and other tools
OMC Textile Division Presentation 2021.pptx

Protection, directory implementation

  • 2. Protection  When information is stored in a computer system, we want to keep it safe from physical damage(reliability) and improper access(protection).  Protection can be provided in many ways.  For a small single-user system, we might provide protection by physically removing the floppy disks and locking them in a desk drawer or file cabinet.
  • 3. Continue… I. Types of access:  The need to protect files is a direct result of the ability to access files.  Several different types of operations may be controlled: Read : Read from the file. Write : Write or rewrite the file. Execute : Load the file into memory and execute it Append : Write new information at the end of the file. Delete : Delete the file and free its space for possible reuse. List : List the name and attributes of the file.
  • 4. Continue… II. Access control:  The most common approach to the protection problem is to make access dependent on the identity of the user.  To condense the length of the access-control list, many systems recognize three classifications of users in connection with each file: Owner : The user who created the file is the owner. Group : A set of users who are sharing the file and need similar access is a group, or work group. Universe : All other users in the system constitute the universe.
  • 5. Continue… III. Other protection approaches:  Another approach to the protection problem is to associate a password with each file. Just as access to the computer system is often controlled by a password, access to each file can be controlled in the same way.  The IBMVM/CMS operating system allows three passwords for a minidisk-one each for read, write, and multiwrite access.  Some single-user operating systems--such as MS-DOS and earlier versions of file protection.  Protection mechanisms must be retrofitted into them.
  • 6. Directory Implementation  The selection of directory-allocation and directory- management algorithms significantly affects the efficiency, performance, and reliability of the file system.  In trade-offs involved in choosing one of these algorithms.
  • 7. Continue… I. Linear List:  The simplest method of implementing a directory is to use a linear list of file names with pointers to the data blocks.  This method is simple to program but time-consuming to execute.  Linear search time  Could keep ordered alphabetically via linked list or use B+ tree
  • 8. Continue… Advantage:  It also be used to decrease the time required to delete file  We can mark blank space and attached to free list Disadvantage:  Finding a file requires a linear search  Access is very slow
  • 9. Continue… II. Hash Table:  Another data structure used for a file directory is a hash table.  A linear list stores the directory entries, but a hash data structure is also used.  Insertion and deletion are also fairly straightforward.  although some provision must be made for collisions-situations in which two file names hash to the same location.  Drawback  Only good if entries are fixed size, or use chained-overflow method