Permission Overlays

Version 9 by Cal Lee
on Sep 29, 2011 13:11.

compared with
Current by Paul Wheatley
on May 09, 2012 16:37.

Key
This line was removed.
This word was removed. This word was added.
This line was added.

Changes (1)

View Page History
| *Title* \\ | _Permission Overlays_ |
| *Detailed description* | _Disk images often contain information to which they should apply access restrictions.  This can include deleted files, file fragments, Windows registry hives, and various system files.  This particular dataset does not have associated access restrictions, but it is intended to simulate disk images for which restrictions will be necessary.  The main question is how to properly mediate user access to parts of disk image, when one cannot simply rely on the permissions embedded in the image's filesystem metadata._ |
| *Issue champion* | _Cal Lee, UNC_ [~callee]\\ |
| *Other interested parties* \\ | _Various developers and repository professionals.  See e.g. the members of the two BitCurator project working groups:_ _[http://bitcurator.net/peoplebc/]_ |
| *Possible Solution approaches* | * _Allow user to dynamically walk the file tree through a web interface such as at_ [http://cgi.cs.indiana.edu/~geobrown/svp|http://cgi.cs.indiana.edu/~geobrown/svp]