On 7/24/2012 9:16 AM, Paul Gilmartin wrote:
On Tue, 24 Jul 2012 10:05:00 +0300, Binyamin Dissen wrote:

:>Why have such a special list rather than merely verifying that the program
:>resides in an APF authorized library and was linked with AC=1?

Because a program expecting to be a job-step task may be spoofable, allocate
storage in a key where parallel tasks can update it, etc.

Sigh.  I keep forgetting (wishful thinking?) what a primitive OS z/OS is;
that it provides no simple way a program can protect its storage from
meddling by others.  z/OS still thinks it's running on a s/360.

-- gil

Paul,

I never saw an answer from you regarding my question for some examples
of how other non-primitive OS's provide a "simple way a program can
protect its storage from meddling by others"


--

Kind regards,

-Steve Comstock
The Trainer's Friend, Inc.

303-355-2752
http://www.trainersfriend.com

* To get a good Return on your Investment, first make an investment!
  + Training your people is an excellent investment

* Try our tool for calculating your Return On Investment
    for training dollars at
  http://www.trainersfriend.com/ROI/roi.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to