Return to Article Details File Secrecy in a Multi-User Environment Download Download PDF