First page Back Continue Last page Overview Graphics
- Lack of Trust (assumption of trustworthy users)
- All or nothing (subsets of users could not be made)
- Rise of timesharing: frequent usage was impossible because each usage of protected files required operator intervention
- Complexity (efficiency) because the human intervention is so time consuming this type of protection is reserved for only the most sensitive datas.
- File Listings: Users aren't ignorant of file presence.