Unanticipated Context Awareness for Software Configuration Access using the getenv API
نویسنده
چکیده
Configuration files, command-line arguments and environment variables are the dominant tools for local configuration management today. When accessing such program execution environments, however, most applications do not take context, e.g. the system they run on, into account. The aim of this paper is to integrate unmodified applications into a coherent and context-aware system by instrumenting the getenv API. We propose a global database stored in configuration files that includes specifications for contextual interpretations and a novel matching algorithm. In a case study we analyze a complete Debian operating system where every getenv API call is intercepted. We evaluate usage patterns of 16 real-world applications and systems and report on limitations of unforeseen context changes. The results show that getenv is used extensively for variability. The tool has acceptable overhead and improves context-awareness of many applications.
منابع مشابه
Cross-Workspace Impact Awareness for Early Detection of API-induced Indirect Conflicts in Configuration Management
Parallel development has been shown to frequently lead to conflicting changes. These conflicts can be categorized into two main classes: (1) direct conflicts, which arise due to concurrent changes to the same artifact, and (2) indirect conflicts, which arise due to changes in one artifact affecting concurrent changes in another artifact. While the detection of direct conflicts is supported by c...
متن کاملLocation API 2.0 for J2ME - A new standard in location for Java-enabled mobile phones
Key aspects in realizing the maximum potential of advanced Location-Based Services (LBS) are the standardization and cross-platform availability of an Application Programming Interface (API) for mobile phones that allows access to real-time location information. To shorten the development time of advanced LBS, such an API should also provide essential features such as map user interfaces, geoco...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملModelface: an application programming interface (API) for homology modeling studies using Modeller software
An interactive application, Modelface, was presented for Modeller software based on windows platform. The application is able to run all steps of homology modeling including pdb to fasta generation, running clustal, model building and loop refinement. Other modules of modeler including energy calculation, energy minimization and the ability to make single point mutations in the PDB structures a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016