Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
NEXT GENERATION OF OPERATING SYSTEMS DESIGN BASED ON KNOWLEDGE ABSTRACTION Mauro Marcelo Mattos,Dr. FURB – University of Blumenau – Campus IV R.Braz Wanka, 238 - CP 1507 – CEP 89035-160 [email protected] ABSTRACT This work presents an overview of an endogenous self-adaptive and self-reconfigurable approach to operating system design that is being built to improve the system’s usability based on (i) a hyper-dimensional world model, (ii) on DEVS formalism as a runtime environment and, (iii) uses the concept of plans instead of programs. KEYWORDS Knowledge-based operating systems, Operating systems design, Pervasive computing. 1. INTRODUCTION As computing continues to become more accessible, security problems increase. Networking and user friendliness also imply increased vulnerability; sharing and protection are conflicting goals. It is in this sense that Hebbard (1980) states: “It’s important to note that probably no large operating system using current design technology can withstand a determined and well-coordinated attack, and that most such documented penetrations have been remarkably easy”. Since the operating system normally represents only a small portion of the total base of software that runs on a particular system, Deitel (1984) states: “it is much easier to make a system more secure if security is designed into the system from the beginning rather than retrofitted to an existing system. Security measures should be implemented throughout a computer system.”. Another disturbing trend generating considerable interest in information security is the accelerating growth path of security exploitation. According to Waters (2004), "Three years ago, the time between discovery of vulnerability and the exploit was maybe 500 days," she explained. "Now it' s down to fewer than 40 days. As soon as a flaw is discovered, someone is ready to launch an attack that is going to exploit that flaw." When the fact that our actual commercial operating systems are descendants of some version of old Unix is added to this context, it is not difficult to anticipate that those same problems will continue while we continue to building operating systems as we do today. Traditional operating systems support the notion of hardware abstraction level in which each application is supposed to have its own processor (and other resources). This situation, and the fact that, in general, all commercial operating systems are based on the multitasking concept, contributes to problems that were identified 30 years ago (Linde, 1975). These problems range from security to usability, including a lack of adequate behaviour during fluctuating execution conditions and the user’s privacy. Besides this, there are two other concepts that contribute to making matters worse: (i) the operator concept and, (ii) the program concept (Mattos, 2003). The operator
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/18/2009 for the course QWE 10 taught by Professor Duc during the Spring '09 term at Shandong University.

Page1 / 6


This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online