Dissecting configuration management policies

3Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A configuration management policy specifies the procedures through which a user evolves artifacts stored in a configuration management system. Different configuration management systems typically use different policies, and new policies continue to be developed. A problem in the development of these new policies is that existing policies (and their implementations) typically cannot be reused. As a basis for a future solution, this paper presents a new configuration management system architecture that focuses on modulaily specified policies. In particular, policies consist of a set of constraint modules, which enforce the desired repository structure, and a set of action modules, which govern the desired user interaction. New policies can be developed by combining relevant existing modules from existing policies with new modules that specify the unique aspects of the new policy. We demonstrate how several quite different configuration management policies can be effectively constructed this way. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Van Der Lingen, R., & Van Der Hoek, A. (2003). Dissecting configuration management policies. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2649, 177–190. https://doi.org/10.1007/3-540-39195-9_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free