On Sat, Mar 23, 2002 at 02:36:32PM +0530, Sridhar N wrote: > Is there any place where i can get good online information about how B+ > Trees are implemented ? If google doesn't help, you might need to shell out $$$ for an actual algorithms book. It will probably be money well spent. > And i want to design a file system with transparent encryption, what > would be the best password policy ( like - password for every file , > password for a directory, expiration of a password after some > time,password only when mounting... ) This is all policy -- in other words, the kernel isn't likely to care what policy you adapt. The policy should be decided based on your requirements. I personally would hate per-file passwords, but that is because I think of dealing with thousands of files. Someone with five files might find it extremely usable. It is probably possible to think of several dozen different ways to grant access to the files based on password inputs. Write down the pros/cons of each method under consideration, and weigh each against what you are trying to accomplish -- who is your adversary, with what capabilities? What is his or her goal? Finally, look at your pro/cons of your approaches, and try your best to defeat your adversary. :) (I'd be happy to debate the finer points of this once you come up with adversary models and pros/cons .. though that debate might best happen off-list.) Cheers -- UniNet InfoSec Conference April 15-19 http://infosec.uninet.edu
Attachment:
pgp00052.pgp
Description: PGP signature