Enterprise Systems Architecture/370: An Architecture for Multiple Virtual Space Access and Authorization
نویسندگان
چکیده
The Enterprise Systems Architecturel370" provides a significant step in the IBM System/370 evolution by providing new capabilities for virtual addressing and program linkage across multiple address spaces. This paper reviews the evolution that led to this advance and illuminates the goals, such as eliminating growth constraints and improving security, integrity, reliability, and performance, that have guided it. The major architectural capabilities are discussed, along with the system environments in which they are useful. The rationale for design choices is presented and related to issues of performance, access authorization, and constraints relief.
منابع مشابه
Providing an Enterprise Architecture Framework Model for Laboratory Information Management Systems by Service Oriented Approach
Background and Aim: Laboratories are one of the most important scientific and research centers. Laboratory information management systems provide a platform for recording the information and collaborating between researchers. The main purpose of this study was suggesting an organizational architecture model of laboratory information management systems. Materials and Methods: This study was a ...
متن کاملESA/390 Interpretive-Execution Architecture, Foundation for VM/ESA
The interpretive-execution facility of Enterprise Systems Architecture/390TM (ESA/390TM) provides an instruction for the execution of virtual machines. This instruction, called START INTERPRETIVE EXECUTION (SIE), was initially created for virtualizing either System/370m or 370-XA architectures and was used later for virtualizing ESA/370' and ESA/390 architectures. SIE has evolved to provide cap...
متن کاملAn Authorization Architecture for Web Services
This paper considers the authorization service requirements for the service oriented architecture and proposes an authorization architecture for Web services. It describes the architectural framework, the administration and runtime aspects of our architecture and its components for secure authorization of Web services as well as the support for the management of authorization information. The p...
متن کاملA Distributed Architecture for Certificate-Based Delegation of Business Process Accessibility in Virtual Organizations
In this paper, a distributed architecture has been proposed in order to support an authorization service more precisely in dynamically created Virtual Organizations (VO). In comparison with other existing architectures such as Akenti, VOMS and TAS, our architecture uses certificates on top of the distributed agent architecture for managing requested resources among the VOs. The most obscure iss...
متن کاملAnalysis of the Liquid Architecture Ideology Based on Marcos Novak’s Theories
Marcos Novak mainly considers a type of architecture cuts loose from the expectations of logic, perspective, and laws of gravity, and has invented a set of conceptual tools for thinking about and constructing territories in cyberspace. Novak introduces the concept of "liquid architecture”, a fluid, imaginary landscape that exists only in the Digital domain. He views trans-architecture as an exp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IBM Systems Journal
دوره 28 شماره
صفحات -
تاریخ انتشار 1989