Research Article

A Real-Time Detection Method of Software Configuration Errors Based on Fine-Grained Configuration Item Types

Table 5

The constraint rules of some configuration item types.

Configuration item typeRelated configuration item typeConstraint rule

File pathUser nameOperation permission
DirectoryUser nameOperation permission
Partial file pathUser nameOperation permission
Partial directory pathFile name[A < partial file path>]+[B<file name>] = [C<file name>]
Partial directory pathUser nameOperation permission
Partial directory pathFile name[A < partial directory path>]+[B<file name>] = [C < directory name>]
NumberNumbermax,min
MemoryMemorymax,min