Permission Overlays

Skip to end of metadata
Go to start of metadata
You are viewing an old version of this page. View the current version. Compare with Current  |   View Page History
Title
Permission Overlays
Detailed description Disk images often contain information to which they should apply access restrictions.  This can include deleted files, file fragments, Windows registry hives, and various system files.  This particular dataset does not have associated access restrictions, but it is intended to simulate disk images for which restrictions will be necessary.  The main question is how to properly mediate user access to parts of disk image, when one cannot simply rely on the permissions embedded in the image's filesystem metadata.
Issue champion Cal Lee, UNC
Other interested parties
Various developers and repository professionals.  See e.g. the members of the two BitCurator project working groups: http://bitcurator.net/peoplebc/
Possible Solution approaches
  • Allow user to dynamically walk the file tree through a web interface such as at http://cgi.cs.indiana.edu/~geobrown/svp
  • Build separate indexes of content and allow users to search over them.
  • Deliver entire disk images that are unchanged.
  • Deliver entire disk images that have redacted the restricted content.
  • Generate redacted disk images on the fly.
Context Details of the institutional context to the Issue. (May be expanded at a later date)
Lessons Learned Notes on Lessons Learned from tackling this Issue that might be useful to inform digital preservation best practice
Datasets Realistic Disk Image Collection for Research and Education
Solutions Reference to the appropriate Solution page(s), by hyperlink
Labels:
None
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.