ISO-13719-1-1998.pdf
《ISO-13719-1-1998.pdf》由会员分享,可在线阅读,更多相关《ISO-13719-1-1998.pdf(470页珍藏版)》请在三一文库上搜索。
1、B C Reference number ISO/IEC 13719-1:1998(E) INTERNATIONAL STANDARD ISO/IEC 13719-1 Second edition 1998-10-01 Information technology Portable Common Tool Environment (PCTE) Part 1: Abstract specification Technologies de linformation Environnement doutil courant portable (PCTE) Partie 1: Spcification
2、s abstraites Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 04/02/2007 20:10:54 MDTNo reproduction or networking permitted without license from IHS -,-,- ISO/IEC 13719-1:1998(E) ISO/
3、IEC 1998 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the publisher. ISO/IEC Copyright Office Case postale 56
4、CH-1211 Genve 20 Switzerland Printed in Switzerland ii Contents 1 Scope1 2 Conformance1 2.1 Conformance of binding1 2.2 Conformance of implementation2 2.3 Conformance of DDL texts and processors3 3 Normative references3 4 Definitions4 4.1 Technical terms4 4.2 Other terms4 5 Formal notations5 6 Overv
5、iew of PCTE5 6.1 PCTE structural architecture5 6.2 Object management system6 6.3 Object base6 6.4 Schema management6 6.5 Self-representation and predefined SDSs7 6.6 Object contents7 6.7 Process execution8 6.8 Monitoring8 6.9 Communication between processes8 6.10 Notification8 6.11 Concurrency and i
6、ntegrity control8 6.12 Distribution9 6.13 Replication9 6.14 Security10 6.15 Accounting10 6.16 Implementation limits10 6.17 Support of fine-grain objects11 6.18 Support of object-orientation11 7 Outline of the Standard11 Copyright International Organization for Standardization Provided by IHS under l
7、icense with ISO Licensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 04/02/2007 20:10:54 MDTNo reproduction or networking permitted without license from IHS -,-,- ISO/IECISO/IEC 13719-1:1998(E) iii 8 Foundation13 8.1 The state13 8.2 The object base14 8.2.1 Objects14 8.2.2 Attributes1
8、5 8.2.3 Links16 8.3 Types17 8.3.1 Object types17 8.3.2 Attribute types18 8.3.3 Link types19 8.3.4 Enumeral types23 8.4 Types in SDS23 8.4.1 Object types in SDS25 8.4.2 Attribute types in SDS25 8.4.3 Link types in SDS26 8.4.4 Enumeral types in SDS26 8.5 Types in working schema26 8.5.1 Object types in
9、 working schema27 8.5.2 Attribute types in working schema28 8.5.3 Link types in working schema28 8.5.4 Enumeral types in working schema28 8.6 Types in global schema28 8.7 Operations29 8.7.1 Calling process29 8.7.2 Direct and indirect effects29 8.7.3 Errors32 8.7.4 Operation serializability33 9 Objec
10、t management33 9.1 Object management concepts33 9.1.1 The basic type “object“33 9.1.2 The common root37 9.1.3 Datatypes for object management37 9.2 Link operations37 9.3 Object operations47 9.4 Version operations61 10 Schema management69 10.1 Schema management concepts69 10.1.1 Schema definition set
11、s and the SDS directory69 10.1.2 Types70 10.1.3 Object types71 10.1.4 Attribute types72 Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 04/02/2007 20:10:54 MDTNo reproduction or netwo
12、rking permitted without license from IHS -,-,- ISO/IEC 13719-1:1998(E) ISO/IEC iv 10.1.5 Link types73 10.1.6 Enumeral types74 10.1.7 Datatypes for schema management75 10.2 SDS update operations75 10.3 SDS usage operations105 10.4 Working schema operations112 11 Volumes, devices, and archives117 11.1
13、 Volume, device, and archiving concepts117 11.1.1 Volumes117 11.1.2 Administration volumes118 11.1.3 Devices118 11.1.4 Archives119 11.2 Volume, device, and archive operations120 12 Files, pipes, and devices128 12.1 File, pipe, and device concepts128 12.2 File, pipe, and device operations132 13 Proce
14、ss execution140 13.1 Process execution concepts140 13.1.1 Static contexts140 13.1.2 Foreign execution images141 13.1.3 Execution classes141 13.1.4 Processes142 13.1.5 Initial processes149 13.1.6 Profiling and monitoring concepts150 13.2 Process execution operations150 13.3 Security operations166 13.
15、4 Profiling operations171 13.5 Monitoring operations172 14 Message queues174 14.1 Message queue concepts174 14.2 Message queue operations177 15 Notification183 15.1 Notification concepts183 15.1.1 Access events and notifiers183 15.1.2 Notification messages184 15.1.3 Time of sending notification mess
16、ages185 15.1.4 Range of concerned message queues185 15.2 Notification operations185 Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 04/02/2007 20:10:54 MDTNo reproduction or networkin
17、g permitted without license from IHS -,-,- ISO/IECISO/IEC 13719-1:1998(E) v 16 Concurrency and integrity control187 16.1 Concurrency and integrity control concepts187 16.1.1 Activities187 16.1.2 Resources and locks190 16.1.3 Lock modes192 16.1.4 Inheritance of locks194 16.1.5 Establishment and promo
18、tion of locks195 16.1.6 Implied locks196 16.1.7 Conditions for establishment or promotion of a lock197 16.1.8 Releasing locks198 16.1.9 Permanence of updates199 16.1.10 Tables for locks200 16.2 Concurrency and integrity control operations202 17 Replication208 17.1 Replication concepts208 17.1.1 Repl
19、ica sets208 17.1.2 Replicated objects209 17.1.3 Selection of an appropriate replica210 17.1.4 Administration replica set211 17.2 Replication operations212 18 Network connection218 18.1 Network connection concepts218 18.1.1 Execution sites218 18.1.2 Workstations219 18.1.3 Foreign systems222 18.1.4 Ne
20、twork partitions222 18.1.5 Accessibility223 18.1.6 Workstation closedown225 18.2 Network connection operations226 18.3 Foreign system operations231 18.4 Time operations233 19 Discretionary security234 19.1 Discretionary security concepts234 19.1.1 Security groups234 19.1.2 Access control lists238 19
21、.1.3 Discretionary access modes241 19.1.4 Access control lists on object creation243 19.2 Operations for discretionary access control operation244 19.3 Discretionary security administration operations248 Copyright International Organization for Standardization Provided by IHS under license with ISO
22、Licensee=IHS Employees/1111111001, User=Wing, Bernie Not for Resale, 04/02/2007 20:10:54 MDTNo reproduction or networking permitted without license from IHS -,-,- ISO/IEC 13719-1:1998(E) ISO/IEC vi 20 Mandatory security253 20.1 Mandatory security concepts253 20.1.1 Mandatory classes253 20.1.2 The ma
23、ndatory class structure255 20.1.3 Labels and the concept of dominance256 20.1.4 Mandatory rules for information flow258 20.1.5 Multi-level security labels261 20.1.6 Floating security levels264 20.1.7 Implementation restrictions266 20.1.8 Built-in policy aspects266 20.2 Operations for mandatory secur
24、ity operation268 20.3 Mandatory security administration operations274 20.4 Mandatory security operations for processes279 21 Auditing281 21.1 Auditing concepts281 21.1.1 Audit files281 21.1.2 Audit selection criteria283 21.2 Auditing operations284 22 Accounting289 22.1 Accounting concepts289 22.1.1
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISO 13719 1998
链接地址:https://www.31doc.com/p-3774603.html