Enterprise Systems Architecture/370: An Architecture for Multiple Virtual Space Access and Authorization

نویسندگان

  • Casper A. Scalzi
  • Alan G. Ganek
  • Richard J. Schmalz
چکیده

The Enterprise Systems Architecturel370" provides a significant step in the IBM System/370 evolution by providing new capabilities for virtual addressing and program linkage across multiple address spaces. This paper reviews the evolution that led to this advance and illuminates the goals, such as eliminating growth constraints and improving security, integrity, reliability, and performance, that have guided it. The major architectural capabilities are discussed, along with the system environments in which they are useful. The rationale for design choices is presented and related to issues of performance, access authorization, and constraints relief.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Providing an Enterprise Architecture Framework Model for Laboratory Information Management Systems by Service Oriented Approach

Background and Aim: Laboratories are one of the most important scientific and research centers. Laboratory information management systems provide a platform for recording the information and collaborating between researchers. The main purpose of this study was suggesting an organizational architecture model of laboratory information management systems.  Materials and Methods: This study was a ...

متن کامل

ESA/390 Interpretive-Execution Architecture, Foundation for VM/ESA

The interpretive-execution facility of Enterprise Systems Architecture/390TM (ESA/390TM) provides an instruction for the execution of virtual machines. This instruction, called START INTERPRETIVE EXECUTION (SIE), was initially created for virtualizing either System/370m or 370-XA architectures and was used later for virtualizing ESA/370' and ESA/390 architectures. SIE has evolved to provide cap...

متن کامل

An Authorization Architecture for Web Services

This paper considers the authorization service requirements for the service oriented architecture and proposes an authorization architecture for Web services. It describes the architectural framework, the administration and runtime aspects of our architecture and its components for secure authorization of Web services as well as the support for the management of authorization information. The p...

متن کامل

A Distributed Architecture for Certificate-Based Delegation of Business Process Accessibility in Virtual Organizations

In this paper, a distributed architecture has been proposed in order to support an authorization service more precisely in dynamically created Virtual Organizations (VO). In comparison with other existing architectures such as Akenti, VOMS and TAS, our architecture uses certificates on top of the distributed agent architecture for managing requested resources among the VOs. The most obscure iss...

متن کامل

Analysis of the Liquid Architecture Ideology Based on Marcos Novak’s Theories

Marcos Novak mainly considers a type of architecture cuts loose from the expectations of logic, perspective, and laws of gravity, and has invented a set of conceptual tools for thinking about and constructing territories in cyberspace. Novak introduces the concept of "liquid architecture”, a fluid, imaginary landscape that exists only in the Digital domain. He views trans-architecture as an exp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IBM Systems Journal

دوره 28  شماره 

صفحات  -

تاریخ انتشار 1989