Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 189))

  • 1855 Accesses

Abstract

The article focuses on analyzing influence of IBM i security mechanisms in network layer on general system performance. Impact of system’s security mechanisms on both system and network resources are presented. Additionally, special security metrics is presented to enable comparison of security level between different system configurations. General guidelines for using security mechanisms of IBM i are given. The paper concludes that because of deep integration of security mechanisms, no major impact on the overall system performance was observed. Propositions of further research are also given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Engelsman, W.: Information Assets and their Value. Univ. of Twente (2007)

    Google Scholar 

  2. Brinkley, D.L., Schell, R.R.: Concepts and Terminology for Computer Security. IEEE Computer Society, Los Alamitos (1995)

    Google Scholar 

  3. Jansen, W.: Directions in Security Metrics Research. National Institute of Standards and Technology (2009)

    Google Scholar 

  4. IBM i information center, http://publib.boulder.ibm.com/infocenter/iseries/v7r1m0/index.jsp (quoted: May 20, 2011)

  5. http://www.mcpressonline.com/security/ibm-i-os400-i5os/sneak-peek-of-the-new-security-features-in-v7.html (quoted: May 25, 2011)

  6. Swanson, M., Bartol, N., Sabato, J., Hash, J., Graffo, L.: Security Metrics Guide for Information Technology Systems. National Institute of Standards and Technology (2003)

    Google Scholar 

  7. Liderman, K.: O pomiarach bezpieczeństwa teleinformatycznego. In: IAiR WAT (2006)

    Google Scholar 

  8. Introduction to IBM i for Computer Professionals, Student Notebook, IBM (2008)

    Google Scholar 

  9. Cook, J., Cantalupo, J.C., Lee, M.: Security Guide for IBM i V6.1, IBM (2009)

    Google Scholar 

  10. Murdoch, J. (ed.): PSM Security Measurement White Paper, PSM Safety & Security, TWG (2006)

    Google Scholar 

  11. Value proposition for IBM System i, International Technology Group (2008), http://www.compu-tech-inc.com/downloads/ISW03005USEN-ITC-Report.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maciej Piec .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Piec, M., Pozniak-Koszalka, I., Koziol, M. (2013). Analysis of Selected Aspects of “IBM I” Security. In: Herrero, Á., et al. International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions. Advances in Intelligent Systems and Computing, vol 189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33018-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33018-6_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33017-9

  • Online ISBN: 978-3-642-33018-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics