By Topic

An access control mechanism for computing resources

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)

We have described the objectives and architecture of an experimental system component, the inventory control system, which provides controlled access to system resources and data with decentralized authorization responsibility. In addition, the inventory control system is a prerequisite for an automatic dataset migration and staging facility. The control system provides a mechanism for the collecting of dataset usage statistics not other wise provided in OS MVT or OS/VS2 and is a supplement of the catalog function. The system has been implemented and meets the implementation objectives that have been described in this paper. The system has proved to be reliaibnl e very measureable respect. Security is not an absolute attribute; our objective was to obtain a significant improvement in protection within the costs acceptable to a commercial data processing installation. The described mechanism provides a considerable obstacle against a marginal informed violator. Protection against the informed and determined opponent will require deep-reaching changes in systems design as well. We believe, however, that many of the concepts tested with the inventory control system will be necessary in future #x201C;secure” systems.

Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.  

Published in:

IBM Systems Journal  (Volume:14 ,  Issue: 3 )