摘要 |
PROBLEM TO BE SOLVED: To monitor a large amount of programs without costing much. SOLUTION: An access monitoring part 20 detects an access request from a target program 30 to a host resource. When detecting the access request, determines whether the access request has an influence on the host resource on the basis of the type of the access request. When the access monitoring part 20 determines that the access request has no influence on the host resource, the access monitoring part 20 allows the target program 30 to access the host resource requested by the access request. When it determines that the access request has an influence on the host resource, the access monitoring part 20 makes the target program 30 access a virtual resource created so as to be the same as the host resource in place of the host resource requested by the access request. COPYRIGHT: (C)2010,JPO&INPIT |