Proceedings of the November 30--December 1, 1965, Fall Joint Computer Conference, Part I on XX - AFIPS '65 (Fall, Part I) 1965
DOI: 10.1145/1463891.1463915
|View full text |Cite
|
Sign up to set email alerts
|

A general-purpose file system for secondary storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

1966
1966
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 90 publications
(19 citation statements)
references
References 9 publications
0
19
0
Order By: Relevance
“…File organization for time-shared systems has been described at length elsewhere [3,4]. Oin-problem is to define a feasible file organization for a small core computer.…”
Section: Methods Of File Organizationmentioning
confidence: 99%
“…File organization for time-shared systems has been described at length elsewhere [3,4]. Oin-problem is to define a feasible file organization for a small core computer.…”
Section: Methods Of File Organizationmentioning
confidence: 99%
“…Two forms were developed, capabilities [6] and access control lists, ACLs [5]. ACLs use the subject's identity to make access decisions and are the most common form of Identification-Based Access Control (IBAC).…”
Section: Prior Workmentioning
confidence: 99%
“…Daley and Neumann (1965) describe in the Multics file system design paper the need for users to store their data within the computing environment itself as opposed to storage media such as cards and tape. The user would have complete control and ownership of his data as well as the metadata.…”
Section: A History Of File Metadatamentioning
confidence: 99%
“…They formulated the following design objectives: ''Little-used information must percolate to devices with longer access times, to allow ample space on faster devices for more frequently used files. Furthermore, information must be easy to access when required, it must be safe from accidents and maliciousness, and it should be accessible to other users on an easily controllable basis when desired'' (Daley and Neumann 1965). To determine how frequently information was used they proposed an access timestamp.…”
Section: A History Of File Metadatamentioning
confidence: 99%