Analyzing Persistent State Interactions to Improve State Management
- Emre Kiciman ,
- Brad Daniels ,
- Shan Lu ,
- Roussi Roussev ,
- Yi-Min Wang ,
- Chad Verbowski ,
- Juhan Lee
ACM SIGMETRICS 2006 |
Published by Association for Computing Machinery, Inc.
Short Paper.
A primary challenge to building reliable and secure computer systems is managing the persistent state (PS) of the system: all the executable files, configuration settings and other data that govern how a system functions. The difficulty comes from the sheer volume of this persistent state, the frequency of changes to it, and the variety of workloads and requirements that require customization of persistent state. The cost of not managing a are the leading cause of downtime at Internet services, troubleshooting configuration problems is a leading component of total cost of ownership in corporate environments, and malware effectively, unwanted persistent state²is a serious privacy and security concern on personal computers.
Copyright © 2007 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept, ACM Inc., fax +1 (212) 869-0481, or permissions@acm.org. The definitive version of this paper can be found at ACM's Digital Library --http://www.acm.org/dl/.