File Access Patterns and Login Preloading
نویسنده
چکیده
I demonstrate a user-level le system tracing technique for Solaris and AFS. The results generally connrm previous studies. A notable exception is that long-lived les are more common than previously measured. I also show how to generate a list of les necessary at login time, and use it to improve workstation login speed by 24 percent.
منابع مشابه
Implementing Execution Controls in Unix
Current implementations of UNIX offer security features in the form of discretionary access controls (DACs). DACs are implemented with file access permissions and access control lists (ACLs). Unfortunately, neither of these facilities provide for access control to active processes. In order to provide many users access to a process (and its associated data) the current practice at our site is t...
متن کاملMore Patterns for Operating System Access Control
We present architectural patterns for access control in operating systems. These complement the patterns that we introduced in a previous paper. The patterns control access to resources represented as objects and include patterns for authentication, process creation, object creation, and object access. Introduction We present architectural patterns for access control in operating systems. These...
متن کاملAcceptor and Connector Design Patterns for Initializing Communication Services
This paper describes the Connector and Acceptor patterns. The intent of these patterns is to decouple the active and passive connection roles, respectively, from the tasks a communication service performs once connections are established. Common examples of communication services that utilize these patterns include WWW browsers, WWW servers, object request brokers, and “superservers” that provi...
متن کاملAccess Control in a World of Software Diversity
We describe a new design for authentication and access control. In this design, principals embody a flexible notion of authentication. They are compound principals that reflect the identities of the programs that have executed, even those of login programs. These identities are based on a naming tree. Our access control lists are patterns that recognize principals. We show how this design suppo...
متن کاملAuthentication and Authorization:The Big Picture with IEEE 802.1X
Current authentication protocols (i.e. user login and password) successfully restrict access to properly configured workstations and servers. Traditionally, a user’s privileges will allow (or deny) access to files or applications on the local machine or on other machines within its domain. Yet, authorized access to a particular machine (or domain) does not necessarily correlate with access to p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998