期刊文献+

GECISM中的回滚、备份与设障 被引量:1

Rollback, backup and obstruction in GECISM
下载PDF
导出
摘要 检查点技术用来对系统中正常运行的程序有效状态进行备份,当系统出现故障时,可以根据最近的检查点恢复当前失效的进程,减少计算的损失。由不同的代理构成的计算机免疫系统GECISM(GEneral ComputerImmune System Model)是把生物免疫系统的机理用于计算机安全领域的一个产物。通过比较多种不同的检查点机制,选择利用缓冲回滚系统BRAS(Buffering RollbAckSystem)检查点机制实现GECISM中类TD代理功能,使系统回卷到以前洁净点状态。 Checkpointing technology is used to reduce the computing loss through saving the valid state of normal running processes and restoring the disabled process according to the newest checkpoint after the system failures. Computer immune system GECISM (GEneral Computer Immune System Model) which constituted by multi-agents is a production of the immune system applying in the computer security field. By comparing several different checkpoint mechanism, the TD agent in GECISM utilizes BRAS (Buffering RollbAck System) to realize its function, and makes the system rollback to the recent cleanliness status.
作者 常卓 王凤先
出处 《计算机工程与设计》 CSCD 2003年第11期95-97,共3页 Computer Engineering and Design
关键词 GECISM 计算机免疫系统 缓冲回滚系统 计算机安全 computer immune checkpoint rollback network security
  • 相关文献

参考文献6

  • 1王凤先,刘振鹏,李继民,常胜.一种仿生物免疫的计算机安全系统模型[J].小型微型计算机系统,2003,24(4):698-701. 被引量:18
  • 2Litzkow M, Solomon M.Supporting checkpointing and process migration outside the unix kernel [C]. San Francisco:Proceedings of Usenix Winter Techincal Conference, 1992.
  • 3Hyo-chang Nam, Jong Kim, SungJe Hong, et al. Probabilistic checkpointing [C]. IEICE Transactions on Information and Systems, 2002.
  • 4Plank J S, Beck M, Kinsley G, et al. Libckpt:Transparent checkpointing under unix[C].New Orleans:Proceeding of the Usenix Winter Technical Conference, 1995.213-223.
  • 5Chung P E, Huang Y. Checkpointing in CosMic:A user-level process migration environment[C]. Taipei,TAIWAN:Pacific Rim International Symposium on Fault-Tolerant Systems,1997.187-193.
  • 6Dan Pei. Modification operation buffering:A low-overhead approach to checkpoint user files[C]. Wisconsin,USA:The 29th International Symposium on Fault-Tolerant Computing,1999.

二级参考文献2

共引文献17

同被引文献8

  • 1Vaidya N H. A case for two-level distributed recovery schemes measur rement and modeling[J]. Computer Systems, 1995,40:64-73.
  • 2Vaidya N H. A case for two-level recovery schemes[J].IEEE Transactions on Computers,1998,47:656-666.
  • 3Nakagawa T, Mizutani S, Chen M. A summary of periodic and random inspection policies[J].Reliability Engineering and System Safety, 2010,95:906-911.
  • 4Naruse K, Umemura S, Nakagawa S. Optimal checkpointing interval for two-Level recovery schemes[J].Computers and Mathematics with Application,2006,51:371-376.
  • 5Lain Y. Geometric processes and replacement problem[J]. Acta Mathematicae Applicatae Sinica, 1988,4(4): 366-377.
  • 6Zhang Y L. Wang G J. A geometric process repair model for a repairable cold standby System with priority in use and repair[J]. Reliab. Eng. Syst Saf., 2009,94:1782-1787.
  • 7Wang G J, Zhang Y L. An optimal replacement policy for a two-component series system assuming geometric process repair[J]. Comp and Math with Appli.,2007,54:192-202.
  • 8李继祥,高建强,于振林.基于可靠性分析的近海工程结构分析与评价[J].辽宁工程技术大学学报(自然科学版),2001,20(2):162-165. 被引量:3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部