A prototype implementation of a time interval file protection system in Linux

Control of access to information based on temporal attributes has many potential applications. Examples include student user accounts set to expire upon graduation; files marked as time-sensitive so that their contents can be protected appropriately and the period of access to them controlled; and...

Full description

Bibliographic Details
Main Author: Chiang, Ken H.
Other Authors: lIrvine, Cynthia E.
Format: Others
Published: Monterey, California. Naval Postgraduate School 2012
Subjects:
Online Access:http://hdl.handle.net/10945/2359