120 Hits in 13.9 sec

VM/370 asymmetric multiprocessing

L. H. Holley, R. P. Parmelee, C. A. Salisbury, D. N. Saul
1979 IBM Systems Journal  
Historically, two approaches to ensuring integrity have been em- ployed in the various releases of VM/370. They are key-based and change-bit-based storage protection.  ...  The integrity of all serial processes was to be maintained. Cost-justified performance was to be ensured. A base was to be created for the VM/370 Resource Management Program.”  ... 
doi:10.1147/sj.181.0047 fatcat:swra6vhhx5dwllaj73orlfluqe

Performance measurement tools for VM/370

P. H. Callaway
1975 IBM Systems Journal  
Considerable experience has been gained in the performance analysis of VM/370 systems based on sampled data obtained by a virtual machine.  ...  A user planning more interactive use of the system will estimate system response NO. 2 + 1975 vM/370 PERFORMANCE MEASUREMENT user level— the INDICATE command based on the Q1 (and not Q2) value in conjunction  ... 
doi:10.1147/sj.142.0134 fatcat:4z456f4awnhe7fjibzokdsnr3a

Virtual Control Storage-curity measures in VM/370

C. R. Attanasio
1979 IBM Systems Journal  
Performance The motivation for the design and implementation of VCS was to improve the capability of VM/370 to control access to a shared re- source in a secure fashion.  ...  One complete communication was traced between a VMS program and the data base program executing in VCS.  ... 
doi:10.1147/sj.181.0093 fatcat:tf4nmcwsdrdwlmqffxxquyz5aq

Laboratory automation via a VM/370 teleprocessing virtual machine

A. A. Guido, J. Considine
1977 Proceedings of the June 13-16, 1977, national computer conference on - AFIPS '77  
A mechanism called the Teleprocessing Virtual Machine (TPVM) has been designed to provide remote intelligent sub-systems with the ability to access and utilize the power of the IBM VM/370 environment.  ...  This paper describes the TPVM implementation and operation in a laboratory environment at the Yorktown Research Center. However, the TPVM mechanism is applicable to a much broader spectrum of usage.  ...  ACKNOWLEDGMENTS The authors wish to thank their many colleagues at the Research Center for their help and support. We are particularly grateful to P. Greier for his documentation efforts, to Drs. H.  ... 
doi:10.1145/1499402.1499561 dblp:conf/afips/GuidoC77 fatcat:alfrunxl5bandmgapeh5hoa5c4

VM/370—A study of multiplicity and usefulness

L. H. Seawright, R. A. MacKinnon
1979 IBM Systems Journal  
One of the objectives of this paper and those that follow in this issue is to show how VMl370 has provided an architectural base for production as well as experimentation for a wide variety of users and  ...  Each user of VM/370 can select a different operating system, if desired, because different operating I systems can run concurrently in different virtual machines.  ...  system integrity and security.* In addition to providing address space isolation, VM/370 requires a password when each user logs on.  ... 
doi:10.1147/sj.181.0004 fatcat:r7ahjq6bunbj3fqxdybarns2ke

Penetrating an operating system: a study of VM/370 integrity

C. R. Attanasio, P. W. Markstein, R. J. Phillips
1976 IBM Systems Journal  
The two major de- pendencies of the integrity of user data are physical security (which, in turn, is based on the physical security of the central facility, communication lines, and terminals) and software  ...  In one case, the designers of VM/370 had ignored the operation code in a channel program using data chaining because the hardware appeared to do so.  ... 
doi:10.1147/sj.151.0102 fatcat:lggagrzisvel7ayhhdyfrnly5i

The changing virtual machine environment: Interfaces to real hardware, virtual hardware, and other virtual machines

R. A. MacKinnon
1979 IBM Systems Journal  
Donovan, ‘‘A note on performance of VM/370 in the integration of mod- els and data bases,’’ The Computer Journal 21, No. 1, 20-24 (Feoruary 1978). . J. J. Donovan, R. Fessel, S. G. Greenberg, and L.  ...  Both ran VM/370, but the Model 115 executed a substantially smaller nucleus (approximately 100K bytes).*° The experiment was meant to evaluate VM/370 in such an environment, and also to use the Model 115  ... 
doi:10.1147/sj.181.0018 fatcat:r4kvqssnmnfc3chzfceg32fv74

Hierarchical approach to computer system integrity

J. J. Donovan, S. E. Madnick
1975 IBM Systems Journal  
Security is an important factor if the programs of independent and possibly error-prone or malicious users are to coexist on the same computer system.  ...  It is helpful to further divide the concept of integrity into two related concepts: security and reliability.  ...  As noted by the reviewers, several of the concepts advocated by the authors, such as hierarchical systems and virtual machines, are controversial.  ... 
doi:10.1147/sj.142.0188 fatcat:mqjux7hykzhspjih3sjllmvlki

System/7 in a hierarchical laboratory automation system

H. Cole
1974 IBM Systems Journal  
Through VM/370 and LABS/7 (as shown in Figure 7), the Sys- tem/7 experimenter can do one or more of the following opera- tions more or less concurrently: e¢ Write data on his VM/370 disk space. ¢ Bring  ...  AUTOLOGON is a VM/370 procedure developed by M. Hefler that permits one VM/370-CMS machine to log on another VM/370-CMS machine as though it were a user at a terminal.  ... 
doi:10.1147/sj.134.0307 fatcat:sy7iidh5zjfmpexkcrbb5ogu7a

Performance analysis of virtual memory time-sharing systems

Y. Bard
1975 IBM Systems Journal  
Bard, “An Analytic Model of CP-67 and VM/370,” International Work- shop on Modelling and Evaluation of Computer Architectures and Net- works, IRIA, Rocquencourt, France (1974).  ...  The performance of the vM/370 system depends in a fundamen- tal way on the multiprogramming level maintained by the sys- tem.  ... 
doi:10.1147/sj.144.0366 fatcat:s6wt6qmhvbgfpibu67lp73njgq

A formal approach for communication between logically isolated virtual machines

R. M. Jensen
1979 IBM Systems Journal  
The numbers were produced on a four-megabyte System/370, Model 158-3 run- ning Release 5 of VM/370 with the VM System Extension Program Product (SEPP).  ...  In viewing the VMCF performance table, note the following items: e The amount of data bytes transferred appears to have a negli- gible impact on the execution time and transaction rates when IBM SYST J  ... 
doi:10.1147/sj.181.0071 fatcat:vhjc33komjeutdqwbtzkj35or4

A VMM security kernel for the VAX architecture

P.A. Karger, M.E. Zurko, D.W. Bonin, A.H. Mason, C.E. Kahn
1990 Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy  
The kernel performs sufficiently well that all of its development is now carried out in virtual machines running on the kernel itself, rather than in a conventional time-sharing system.  ...  The VAX security kernel supports multiple concurrent virtual machines on a single VAX system, providing isolation and controlled sharing of sensitive data.  ...  VM/370, depending on the workload.  ... 
doi:10.1109/risp.1990.63834 dblp:conf/sp/KargerZBMK90 fatcat:sxir3rrvlfehrea4atviaamyfa

Databsse system approach the management decision support

John J. Donovan
1976 ACM Transactions on Database Systems  
That is, the problems are usually not known in advance, they are constantly changing, and answers are needed within a short time frame. Hence, additional tech-  ...  As the complexity of modern day life increases with astonishing rapidity, the complexity of the problems the policymaker must face increases at a correspondingly rapid rate.  ...  implemented [Donovan and Jacoby 1975] using VM/370 [IBM, 1] .  ... 
doi:10.1145/320493.320500 fatcat:kmsk4beqjrdlrezfrst3aurtwu

A distributed information system study

K. Ziegler
1979 IBM Systems Journal  
Springer and J. Weissmann for providing much of the VM/370 expertise required for testing the model. CITED REFERENCES AND NOTES 1. B. H. Liebowitz and J. H.  ...  Describes an architecture based on a collection of mi- croprocessors, each capable of independently processing a subset of the data base in parallel. GENERAL REFERENCES AND NOTES H. B.  ... 
doi:10.1147/sj.183.0374 fatcat:4u3ugmqydbdmvngwkeod5jsvsu

VM/ESA: A single system for centralized and distributed computing

W. T. Fischofer
1991 IBM Systems Journal  
: From VM/370 to VM/ESA Figure 3 shows a simplified VM genealogy.  ...  Data integrity is of fun- damental importance in computing.  ... 
doi:10.1147/sj.301.0004 fatcat:yeg7q4s47jb4xnjv6gt3dkmwj4
« Previous Showing results 1 — 15 out of 120 results