A survey of permission-based distributed mutual exclusion algorithms

被引:29
|
作者
Saxena, PC
Rai, J
机构
[1] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi 110067, India
[2] Univ Delhi, PGDAV Coll Eve, Dept Math, New Delhi, India
关键词
distributed systems; mutual exclusion; k-mutual exclusion; voting; coteries;
D O I
10.1016/S0920-5489(02)00105-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of mutual exclusion in distributed systems has attracted considerable attention over the last two decades. The mutual exclusion problem requires that, at a time, only one of the contending processes be allowed to enter its critical section (CS). A number of solutions have been provided to the mutual exclusion problem in distributed systems. Different algorithms have used different techniques to achieve mutual exclusion and have different performances. Depending on the technique used, these algorithms have been classified as token-based and permission-based algorithms. In this paper, we present a survey of various permission-based distributed mutual exclusion (PBDME) algorithms and their comparative performance. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:159 / 181
页数:23
相关论文
共 50 条
  • [31] Viper: A Verification Infrastructure for Permission-Based Reasoning
    Mueller, Peter
    Schwerhoff, Malte
    Summers, Alexander J.
    DEPENDABLE SOFTWARE SYSTEMS ENGINEERING, 2017, 50 : 104 - 125
  • [32] Permission-Based Programming Languages (NIER Track)
    Aldrich, Jonathan
    Garcia, Ronald
    Hahnenberg, Mark
    Mohr, Manuel
    Naden, Karl
    Saini, Darpan
    Stork, Sven
    Sunshine, Joshua
    Tanter, Eric
    Wolff, Roger
    2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2011, : 828 - 831
  • [33] Viper: A Verification Infrastructure for Permission-Based Reasoning
    Mueller, Peter
    Schwerhoff, Malte
    Summers, Alexander J.
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, VMCAI 2016, 2016, 9583 : 41 - 62
  • [34] Hierarchical token based mutual exclusion algorithms
    Bertier, M
    Arantes, L
    Sens, P
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID - CCGRID 2004, 2004, : 539 - 546
  • [35] Permission-based Malware Detection Mechanisms for Smart Phones
    Su, Ming-Yang
    Chang, Wen-Chuan
    2014 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2014), 2014, : 449 - 452
  • [36] The Design and Formalization of Mezzo, a Permission-Based Programming Language
    Balabonski, Thibaut
    Pottier, Francois
    Protzenko, Jonathan
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2016, 38 (04):
  • [37] Towards Speedy Permission-Based Debloating for Android Apps
    Thung, Ferdian
    Liu, Jiakun
    Rattanukul, Pattarakrit
    Maoz, Shahar
    Toch, Eran
    Gao, Debin
    Lo, David
    PROCEEDINGS OF THE 2024 IEEE/ACM 11TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT 2024, 2024, : 84 - 87
  • [38] Model-based design and analysis of permission-based security
    Jürjens, J
    Lehrhuber, M
    Wimmel, G
    ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 224 - 233
  • [39] Automated analysis of permission-based security using UMLsec
    Juerjens, Jan
    Schreck, Joerg
    Yu, Yijun
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2008, 4961 : 292 - 295
  • [40] PERFORMANCE EVALUATION OF DISTRIBUTED MUTUAL EXCLUSION ALGORITHMS FOR COMPUTER-NETWORKS
    SRIMANI, PK
    MISHRA, S
    COMPUTING SYSTEMS, 1990, 5 (02): : 59 - 64