Protection
Files can be protected in different ways:
- not at all (open system, single-user system)
- protected access: read, write, execute, append, delete
- complete access control list: list of users who have (or are denied) access, along with access allowed/denied
- simple group schemes: owner, group, everyone