The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
Filters
VM/370 asymmetric multiprocessing
1979
IBM Systems Journal
Historically, two approaches to ensuring integrity have been em- ployed in the various releases of VM/370. They are key-based and change-bit-based storage protection. ...
The integrity of all serial processes was to be maintained. Cost-justified performance was to be ensured. A base was to be created for the VM/370 Resource Management Program.” ...
doi:10.1147/sj.181.0047
fatcat:swra6vhhx5dwllaj73orlfluqe
Performance measurement tools for VM/370
1975
IBM Systems Journal
Considerable experience has been gained in the performance analysis of VM/370 systems based on sampled data obtained by a virtual machine. ...
A user planning more interactive use of the system will estimate system response
NO. 2 + 1975 vM/370 PERFORMANCE MEASUREMENT
user level— the INDICATE command
based on the Q1 (and not Q2) value in conjunction ...
doi:10.1147/sj.142.0134
fatcat:4z456f4awnhe7fjibzokdsnr3a
Virtual Control Storage-curity measures in VM/370
1979
IBM Systems Journal
Performance
The motivation for the design and implementation of VCS was to improve the capability of VM/370 to control access to a shared re- source in a secure fashion. ...
One complete communication was traced between a VMS program and the data base program executing in VCS. ...
doi:10.1147/sj.181.0093
fatcat:tf4nmcwsdrdwlmqffxxquyz5aq
Laboratory automation via a VM/370 teleprocessing virtual machine
1977
Proceedings of the June 13-16, 1977, national computer conference on - AFIPS '77
A mechanism called the Teleprocessing Virtual Machine (TPVM) has been designed to provide remote intelligent sub-systems with the ability to access and utilize the power of the IBM VM/370 environment. ...
This paper describes the TPVM implementation and operation in a laboratory environment at the Yorktown Research Center. However, the TPVM mechanism is applicable to a much broader spectrum of usage. ...
ACKNOWLEDGMENTS The authors wish to thank their many colleagues at the Research Center for their help and support. We are particularly grateful to P. Greier for his documentation efforts, to Drs. H. ...
doi:10.1145/1499402.1499561
dblp:conf/afips/GuidoC77
fatcat:alfrunxl5bandmgapeh5hoa5c4
VM/370—A study of multiplicity and usefulness
1979
IBM Systems Journal
One of the objectives of this paper and those that follow in this issue is to show how VMl370 has provided an architectural base for production as well as experimentation for a wide variety of users and ...
Each user of VM/370 can select a different operating system, if desired, because different operating I systems can run concurrently in different virtual machines. ...
system integrity and security.* In addition to providing address space isolation, VM/370 requires a password when each user logs on. ...
doi:10.1147/sj.181.0004
fatcat:r7ahjq6bunbj3fqxdybarns2ke
Penetrating an operating system: a study of VM/370 integrity
1976
IBM Systems Journal
The two major de- pendencies of the integrity of user data are physical security (which, in turn, is based on the physical security of the central facility, communication lines, and terminals) and software ...
In one case, the designers of VM/370 had ignored the operation code in a channel program using data chaining because the hardware appeared to do so. ...
doi:10.1147/sj.151.0102
fatcat:lggagrzisvel7ayhhdyfrnly5i
The changing virtual machine environment: Interfaces to real hardware, virtual hardware, and other virtual machines
1979
IBM Systems Journal
Donovan, ‘‘A note on performance of VM/370 in the integration of mod- els and data bases,’’ The Computer Journal 21, No. 1, 20-24 (Feoruary 1978).
. J. J. Donovan, R. Fessel, S. G. Greenberg, and L. ...
Both ran VM/370, but the Model 115 executed a substantially smaller nucleus (approximately 100K bytes).*° The experiment was meant to evaluate VM/370 in such an environment, and also to use the Model 115 ...
doi:10.1147/sj.181.0018
fatcat:r4kvqssnmnfc3chzfceg32fv74
Hierarchical approach to computer system integrity
1975
IBM Systems Journal
Security is an important factor if the programs of independent and possibly error-prone or malicious users are to coexist on the same computer system. ...
It is helpful to further divide the concept of integrity into two related concepts: security and reliability. ...
As noted by the reviewers, several of the concepts advocated by the authors, such as hierarchical systems and virtual machines, are controversial. ...
doi:10.1147/sj.142.0188
fatcat:mqjux7hykzhspjih3sjllmvlki
System/7 in a hierarchical laboratory automation system
1974
IBM Systems Journal
Through VM/370 and LABS/7 (as shown in Figure 7), the Sys- tem/7 experimenter can do one or more of the following opera- tions more or less concurrently:
e¢ Write data on his VM/370 disk space. ¢ Bring ...
AUTOLOGON is a VM/370 procedure developed by M. Hefler that permits one VM/370-CMS machine to log on another VM/370-CMS machine as though it were a user at a terminal. ...
doi:10.1147/sj.134.0307
fatcat:sy7iidh5zjfmpexkcrbb5ogu7a
Performance analysis of virtual memory time-sharing systems
1975
IBM Systems Journal
Bard, “An Analytic Model of CP-67 and VM/370,” International Work- shop on Modelling and Evaluation of Computer Architectures and Net- works, IRIA, Rocquencourt, France (1974). ...
The performance of the vM/370 system depends in a fundamen- tal way on the multiprogramming level maintained by the sys- tem. ...
doi:10.1147/sj.144.0366
fatcat:s6wt6qmhvbgfpibu67lp73njgq
A formal approach for communication between logically isolated virtual machines
1979
IBM Systems Journal
The numbers were produced on a four-megabyte System/370, Model 158-3 run- ning Release 5 of VM/370 with the VM System Extension Program Product (SEPP). ...
In viewing the VMCF performance table, note the following items:
e The amount of data bytes transferred appears to have a negli- gible impact on the execution time and transaction rates when
IBM SYST J ...
doi:10.1147/sj.181.0071
fatcat:vhjc33komjeutdqwbtzkj35or4
A VMM security kernel for the VAX architecture
1990
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
The kernel performs sufficiently well that all of its development is now carried out in virtual machines running on the kernel itself, rather than in a conventional time-sharing system. ...
The VAX security kernel supports multiple concurrent virtual machines on a single VAX system, providing isolation and controlled sharing of sensitive data. ...
VM/370, depending on the workload. ...
doi:10.1109/risp.1990.63834
dblp:conf/sp/KargerZBMK90
fatcat:sxir3rrvlfehrea4atviaamyfa
Databsse system approach the management decision support
1976
ACM Transactions on Database Systems
That is, the problems are usually not known in advance, they are constantly changing, and answers are needed within a short time frame. Hence, additional tech- ...
As the complexity of modern day life increases with astonishing rapidity, the complexity of the problems the policymaker must face increases at a correspondingly rapid rate. ...
implemented [Donovan and Jacoby 1975] using VM/370 [IBM, 1] . ...
doi:10.1145/320493.320500
fatcat:kmsk4beqjrdlrezfrst3aurtwu
A distributed information system study
1979
IBM Systems Journal
Springer and J. Weissmann for providing much of the VM/370 expertise required for testing the model.
CITED REFERENCES AND NOTES
1. B. H. Liebowitz and J. H. ...
Describes an architecture based on a collection of mi- croprocessors, each capable of independently processing a subset of the data base in parallel.
GENERAL REFERENCES AND NOTES
H. B. ...
doi:10.1147/sj.183.0374
fatcat:4u3ugmqydbdmvngwkeod5jsvsu
VM/ESA: A single system for centralized and distributed computing
1991
IBM Systems Journal
: From VM/370 to VM/ESA
Figure 3 shows a simplified VM genealogy. ...
Data integrity is of fun- damental importance in computing. ...
doi:10.1147/sj.301.0004
fatcat:yeg7q4s47jb4xnjv6gt3dkmwj4
« Previous
Showing results 1 — 15 out of 120 results