Title |
Permission Overlays |
Detailed description | Disk images often contain information to which they should apply access restrictions. This can include deleted files, file fragments, Windows registry hives, and various system files. This particular dataset does not have associated access restrictions, but it is intended to simulate disk images for which restrictions will be necessary. The main question is how to properly mediate user access to parts of disk image, when one cannot simply rely on the permissions embedded in the image's filesystem metadata. |
Issue champion | ![]() |
Other interested parties |
Various developers and repository professionals. See e.g. the members of the two BitCurator project working groups: http://bitcurator.net/peoplebc/![]() |
Possible Solution approaches |
|
Context | Managed by Naval Postgraduate School, UNC SILS (School of Information and Library Science) and ibiblio for use by educators and researchers. |
Lessons Learned | |
Datasets | Realistic Disk Image Collection for Research and Education |
Solutions | Solution Developed by Swithun Crowe |
Labels: