ICSR-7 Proceedings of the 7th International Conference on Software Reuse: Methods, Techniques, and Tools
mkpkg: A software packaging tool
LISA '98 Proceedings of the 12th Conference on Systems Administration
SEPP: Software Installation and Sharing System
LISA '98 Proceedings of the 12th Conference on Systems Administration
On the Notion of Variability in Software Product Lines
WICSA '01 Proceedings of the Working IEEE/IFIP Conference on Software Architecture
Imposing a Memory Management Discipline on Software Deployment
Proceedings of the 26th International Conference on Software Engineering
Local Disk Depot - Customizing the Software Environment: Customizing the Software Environment
LISA '93 Proceedings of the 7th USENIX conference on System administration
Depot-Lite: A Mechanism for Managing Software
LISA '94 Proceedings of the 8th USENIX conference on System administration
Abstract Yourself With Modules
LISA '96 Proceedings of the 10th USENIX conference on System administration
A Retrospective on Twelve Years of LISA Proceedings
LISA '99 Proceedings of the 13th USENIX conference on System administration
Deployme: Tellme's Package Management and Deployment System
LISA '00 Proceedings of the 14th USENIX conference on System administration
Use of Cfengine for Automated, Multi-Platform Software and Patch Distribution
LISA '00 Proceedings of the 14th USENIX conference on System administration
Global Impact Analysis of Dynamic Library Dependencies
LISA '01 Proceedings of the 15th USENIX conference on System administration
An Analysis of RPM Validation Drift
LISA '02 Proceedings of the 16th USENIX conference on System administration
An Approach for Secure Software Installation
LISA '02 Proceedings of the 16th USENIX conference on System administration
Secure sharing between untrusted users in a transparent source/binary deployment model
Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering
Continuous release and upgrade of component-based software
Proceedings of the 12th international workshop on Software configuration management
Service configuration management
Proceedings of the 12th international workshop on Software configuration management
Purely functional system configuration management
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Stratego/XT 0.17. A language and toolset for program transformation
Science of Computer Programming
Expanding Malware Defense by Securing Software Installations
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Developing Product Lines with Third-Party Components
Electronic Notes in Theoretical Computer Science (ENTCS)
CBSE'07 Proceedings of the 10th international conference on Component-based software engineering
Efficient upgrading in a purely functional component deployment model
CBSE'05 Proceedings of the 8th international conference on Component-Based Software Engineering
Towards automated deployment of built-to-order systems
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
CD'05 Proceedings of the Third international working conference on Component Deployment
CDE: run any Linux application on-demand without installation
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
Hi-index | 0.01 |
Existing systems for software deployment are neither safe nor sufficiently flexible. Primary safety issues are the inability to enforce reliable specification of component dependencies, and the lack of support for multiple versions or variants of a component. This renders deployment operations such as upgrading or deleting components dangerous and unpredictable. A deployment system must also be flexible (i.e., policy-free) enough to support both centralised and local package management, and to allow a variety of mechanisms for transferring components. In this paper we present Nix, a deployment system that addresses these issues through a simple technique of using cryptographic hashes to compute unique paths for component instances.