Abstract
The article focuses on analyzing influence of IBM i security mechanisms in network layer on general system performance. Impact of system’s security mechanisms on both system and network resources are presented. Additionally, special security metrics is presented to enable comparison of security level between different system configurations. General guidelines for using security mechanisms of IBM i are given. The paper concludes that because of deep integration of security mechanisms, no major impact on the overall system performance was observed. Propositions of further research are also given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Engelsman, W.: Information Assets and their Value. Univ. of Twente (2007)
Brinkley, D.L., Schell, R.R.: Concepts and Terminology for Computer Security. IEEE Computer Society, Los Alamitos (1995)
Jansen, W.: Directions in Security Metrics Research. National Institute of Standards and Technology (2009)
IBM i information center, http://publib.boulder.ibm.com/infocenter/iseries/v7r1m0/index.jsp (quoted: May 20, 2011)
http://www.mcpressonline.com/security/ibm-i-os400-i5os/sneak-peek-of-the-new-security-features-in-v7.html (quoted: May 25, 2011)
Swanson, M., Bartol, N., Sabato, J., Hash, J., Graffo, L.: Security Metrics Guide for Information Technology Systems. National Institute of Standards and Technology (2003)
Liderman, K.: O pomiarach bezpieczeństwa teleinformatycznego. In: IAiR WAT (2006)
Introduction to IBM i for Computer Professionals, Student Notebook, IBM (2008)
Cook, J., Cantalupo, J.C., Lee, M.: Security Guide for IBM i V6.1, IBM (2009)
Murdoch, J. (ed.): PSM Security Measurement White Paper, PSM Safety & Security, TWG (2006)
Value proposition for IBM System i, International Technology Group (2008), http://www.compu-tech-inc.com/downloads/ISW03005USEN-ITC-Report.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Piec, M., Pozniak-Koszalka, I., Koziol, M. (2013). Analysis of Selected Aspects of “IBM I” Security. In: Herrero, Á., et al. International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions. Advances in Intelligent Systems and Computing, vol 189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33018-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-33018-6_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33017-9
Online ISBN: 978-3-642-33018-6
eBook Packages: EngineeringEngineering (R0)