期刊文献+

进程强制运行控制方法的设计与实现 被引量:2

Design and implementation of processes mandatory running control
下载PDF
导出
摘要 在复杂的企业内部信息网中,应用系统常常会出现不可预见的死锁问题,死锁问题的出现会造成业务的中断,有时甚至会使整个应用系统崩溃。保证应用系统和操作系统正常运行不中断是提高软件可靠性的难题。进程强制运行控制(Mandatory Running Control,MRC)方法通过从操作系统内核中获取进程信息,对各进程进行实时监控,从操作系统内核层面上解决不可预知的死锁问题。进程强制运行控制方法能够确保系统运行的连续性和可靠性,保证网络业务长时间运行不中断,实现从操作系统内核层面上提高软件可靠性。 In the more and more complex enterprise information network environment, many unforeseen deadlock problems appear in application system, which are not easily be found by normal tools or methods.These deadlock problems can cause business interruption and even the crash of the application system.The assurance of application system and operating system running normally without interruption is a hard problem to improve the software reliability.By getting processes' information from operating system kernel, processes' Mandatory running control method can monitor processes running real-timely and solve the unpredictable deadlock problem from the system kernel level.This method can ensure system running consequently and reliably and ensure network business running normally without interruption, improving the software reliability from the system-kernel level.
出处 《通信学报》 EI CSCD 北大核心 2009年第S1期150-153,共4页 Journal on Communications
关键词 软件可靠性 强制运行控制 进程监控 内核保护 software reliability mandatory running control monitoring processes kernel protection
  • 相关文献

参考文献7

  • 1李峰,方旭升.浅谈软件可靠性工程的应用[J].中小企业管理与科技,2008(1):131-133. 被引量:2
  • 2许访,沈昌祥.基于任务的强制访问控制模型[J].计算机应用研究,2004,21(11):70-71. 被引量:7
  • 3(荷)Andrew,S.Tanenbaum著,陈向群,马洪兵等译..现代操作系统 第2版[M].北京:机械工业出版社,2005:552.
  • 4Lubomir,F.,Bic,Alan,C.,Shaw著,梁洪亮等译..操作系统原理[M].北京:清华大学出版社,2005:444.
  • 5信息安全技术[M]. 被引量:1
  • 6颜彬主编..计算机操作系统[M].西安:西安电子科技大学出版社,2001:204.
  • 7(美)[A.S.塔嫩鲍姆]AndrewS.Tanenbaum,(美)[A.S.伍德哈尔]AlbertS.Woodhull著,王鹏等译.操作系统:设计与实现[M]电子工业出版社,1998. 被引量:1

二级参考文献4

  • 1R K Thomas,R S Sandhu.Task- based Authorization Controls (TBAC): A Family of Models for Active and Enterprise- oriented Authorization Management[C].Proceedings of the IFIP WG11.3 Workshop on Database Security,Lake Tahoe,California,1997.11- 13. 被引量:1
  • 2S Fischer- Hubner.IT Security and Privacy[C].LNCS 1958,Springer- Verlag Berlin Heidelberg,2001. 被引量:1
  • 3Jachong Park,Ravi Sandhu.Towards Usage Control Models: Beyond Traditional Access Control[C].7th ACM Symposium on Access Control Models and Technologies,2002. 被引量:1
  • 4Timthy Fraser,Lee Badger.Ensuring Continuity During Dynamic Security Police Reconfiguration in DTE[C].Proceedings of the 1998 IEEE Symposium on Security and Privacy,1998. 被引量:1

共引文献7

同被引文献20

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部