A survey of permission-based distributed mutual exclusion algorithms

被引:29
|
作者
Saxena, PC
Rai, J
机构
[1] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi 110067, India
[2] Univ Delhi, PGDAV Coll Eve, Dept Math, New Delhi, India
关键词
distributed systems; mutual exclusion; k-mutual exclusion; voting; coteries;
D O I
10.1016/S0920-5489(02)00105-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of mutual exclusion in distributed systems has attracted considerable attention over the last two decades. The mutual exclusion problem requires that, at a time, only one of the contending processes be allowed to enter its critical section (CS). A number of solutions have been provided to the mutual exclusion problem in distributed systems. Different algorithms have used different techniques to achieve mutual exclusion and have different performances. Depending on the technique used, these algorithms have been classified as token-based and permission-based algorithms. In this paper, we present a survey of various permission-based distributed mutual exclusion (PBDME) algorithms and their comparative performance. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:159 / 181
页数:23
相关论文
共 50 条
  • [21] Empirical evaluation of mutual exclusion algorithms for distributed systems
    Fu, SS
    Tzeng, NF
    Chung, JY
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2000, 60 (07) : 785 - 806
  • [22] Distributed Mutual Exclusion Algorithms for Intersection Traffic Control
    Wu, Weigang
    Zhang, Jiebin
    Luo, Aoxue
    Cao, Jiannong
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (01) : 65 - 74
  • [23] THE INFORMATION-STRUCTURE OF DISTRIBUTED MUTUAL EXCLUSION ALGORITHMS
    SANDERS, BA
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1987, 5 (03): : 284 - 299
  • [24] Generating Permission-Based Security Policies
    Li, Xin
    Hua Vy Le Thanh
    Deng, Yuxin
    Dolby, Julian
    2018 5TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND THEIR APPLICATIONS (DSA), 2018, : 1 - 7
  • [25] Lock-based self-stabilizing distributed mutual exclusion algorithms
    Mizuno, M
    Nesterenko, M
    Kakugawa, H
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 1996, : 708 - 716
  • [26] Towards Permission-Based Attestation for the Android Platform
    Bente, Ingo
    Dreo, Gabi
    Hellmann, Bastian
    Heuser, Stephan
    Vieweg, Joerg
    von Helden, Josef
    Westhuis, Johannes
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 108 - 115
  • [27] PMDS: Permission-Based Malware Detection System
    Rovelli, Paolo
    Vigfusson, Ymir
    INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 338 - 357
  • [28] Distributed mutual exclusion algorithms for grid applications: A hierarchical approach
    Bertier, M
    Arantes, L
    Sens, P
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (01) : 128 - 144
  • [30] A GENERAL SCHEME FOR TOKEN-BASED AND TREE-BASED DISTRIBUTED MUTUAL EXCLUSION ALGORITHMS
    HELARY, JM
    MOSTEFAOUI, A
    RAYNAL, M
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 1994, 5 (11) : 1185 - 1196