A security module is configured to provide an owner the capability to
differentiate between users. In particular, the security module is
configured to generate an asymmetric read/write key pair for respectively
decrypting/encrypting data for storage on a disk. The owner of the file
may distribute the read key of the asymmetric key pair to a group of
users that the owner has assigned read-permission for the encrypted data.