{"title":"分布式系统的基于域的配置和名称管理","authors":"K. Twidle, M. Sloman","doi":"10.1109/FTDCS.1988.26693","DOIUrl":null,"url":null,"abstract":"An overview is given of the conic configuration environment, which applies the domain concept to the structuring of configuration and name management in a distributed system. The use of access-control lists as a security mechanism is shown. Inheritance rules are specified for access permission and access rights to maintain subdomains and overlapping domain relationships. Servers are required to maintain the domain information and location information on the components in the network. A reliable name service based on an arbitrary number of servers, which permits both partitioning and replication of information, is described.<<ETX>>","PeriodicalId":384536,"journal":{"name":"[1988] Proceedings. Workshop on the Future Trends of Distributed Computing Systems in the 1990s","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Domain based configuration and name management for distributed systems\",\"authors\":\"K. Twidle, M. Sloman\",\"doi\":\"10.1109/FTDCS.1988.26693\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An overview is given of the conic configuration environment, which applies the domain concept to the structuring of configuration and name management in a distributed system. The use of access-control lists as a security mechanism is shown. Inheritance rules are specified for access permission and access rights to maintain subdomains and overlapping domain relationships. Servers are required to maintain the domain information and location information on the components in the network. A reliable name service based on an arbitrary number of servers, which permits both partitioning and replication of information, is described.<<ETX>>\",\"PeriodicalId\":384536,\"journal\":{\"name\":\"[1988] Proceedings. Workshop on the Future Trends of Distributed Computing Systems in the 1990s\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1988-09-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1988] Proceedings. Workshop on the Future Trends of Distributed Computing Systems in the 1990s\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FTDCS.1988.26693\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1988] Proceedings. Workshop on the Future Trends of Distributed Computing Systems in the 1990s","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FTDCS.1988.26693","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Domain based configuration and name management for distributed systems
An overview is given of the conic configuration environment, which applies the domain concept to the structuring of configuration and name management in a distributed system. The use of access-control lists as a security mechanism is shown. Inheritance rules are specified for access permission and access rights to maintain subdomains and overlapping domain relationships. Servers are required to maintain the domain information and location information on the components in the network. A reliable name service based on an arbitrary number of servers, which permits both partitioning and replication of information, is described.<>