Research Article
A Real-Time Detection Method of Software Configuration Errors Based on Fine-Grained Configuration Item Types
Table 5
The constraint rules of some configuration item types.
| Configuration item type | Related configuration item type | Constraint rule |
| File path | User name | Operation permission | Directory | User name | Operation permission | Partial file path | User name | Operation permission | Partial directory path | File name | [A < partial file path>]+[B<file name>] = [C<file name>] | Partial directory path | User name | Operation permission | Partial directory path | File name | [A < partial directory path>]+[B<file name>] = [C < directory name>] | Number | Number | max,min | Memory | Memory | max,min |
|
|