ACF2
   HOME
*





ACF2
ACF2 (Access Control Facility 2) is a commercial, discretionary access control software security system developed for the MVS (z/OS today), VSE (z/VSE today) and VM (z/VM today) IBM mainframe operating systems by SKK, Inc. Barry Schrager, Eberhard Klemens, and Scott Krueger combined to develop ACF2 at London Life Insurance in London, Ontario in 1978. The "2" was added to the ACF2 name by Cambridge Systems (who had the North American marketing rights for the product) to differentiate it from the prototype, which was developed by Schrager and Klemens at the University of Illinois—the prototype name was ACF. The "2" also helped to distinguish the product from IBM's ACF/VTAM. ACF2 was developed in response to IBM's RACF product (developed in 1976), which was IBM's answer to the 1974 SHARE Security and Data Management project's requirement whitepaper. ACF2's design was guided by these requirements, taking a resource-rule oriented approach. Unique to ACF2 were the concepts of "Pr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


CA Technologies
CA Technologies, formerly known as CA, Inc. and Computer Associates International, Inc., is an American multinational corporation headquartered in New York City. It is primarily known for its business-to-business (B2B) software with a product portfolio focused on Agile software development, DevOps, and computer security software spanning across a wide range of environments such as a mainframe, distributed computing, cloud computing, and mobile devices. The company markets nearly 200 software products. Some of the best-known are ACF2 (security), TopSecret (security), Datacom (database), Easytrieve (report generator), IDMS (database), InterTest (debugging), Librarian, Panvalet (source code library management), and TLMS (tape library management). Through 2018, CA Technologies maintained offices in more than 40 countries and employed approximately 11,300 people. CA holds more than 1,500 patents worldwide, and has more than 900 patent applications pending. It was headquartered on Lo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Uccel
UCCEL Corp, previously called University Computing Company ("UCC"), was a data processing service bureau on the campus of Southern Methodist University in Dallas, Texas. It was founded by the Wyly brothers (Sam and Charles, Jr.) in 1963. Oral history interview with Sam Wyly
, University of Minnesota The name change in the mid-1980s was brought about by Gregory Liemandt, placed as by the majority , a Swiss citizen named

RACF
Introduction RACF, ronounced Rack-Effshort for Resource Access Control Facility, is an IBM software product. It is a security system that provides access control and auditing functionality for the z/OS and z/VM operating systems. RACF was introduced in 1976. Originally called RACF it was renamed to z/OS Security Server (RACF) although most mainframe folks still refer to it as RACF. Its main features are: * Identification and verification of a user via user id and password check (authentication) * Identification, classification and protection of system resources * Maintenance of access rights to the protected resources (authorization) * Controlling the means of access to protected resources * Logging of accesses to a protected system and protected resources (auditing) RACF establishes security policies rather than just permission records. It can set permissions for file patterns — that is, set the permissions even for files that do not yet exist. Those permissions ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Commercial Software
Commercial software, or seldom payware, is a computer software that is produced for sale or that serves commercial purposes. Commercial software can be proprietary software or free and open-source software. Background and challenge While software creation by programming is a time and labor-intensive process, comparable to the creation of physical goods, the reproduction, duplication and sharing of software as digital goods is in comparison disproportionately easy. No special machines or expensive additional resources are required, unlike almost all physical goods and products. Once a software is created it can be copied in infinite numbers, for almost zero cost, by anyone. This made commercialization of software for the mass market in the beginning of the computing era impossible. Unlike hardware, it was not seen as trade-able and commercialize-able good. Software was plainly shared for free (hacker culture) or distributed bundled with sold hardware, as part of the service t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Charles Babbage Institute
The IT History Society (ITHS) is an organization that supports the history and scholarship of information technology by encouraging, fostering, and facilitating archival and historical research. Formerly known as the Charles Babbage Foundation, it advises historians, promotes collaboration among academic organizations and museums, and assists IT corporations in preparing and archiving their histories for future studies. Activities The IT History Society provides background information to those with an interest in the history of Information Technology, including papers that provide advice on how to perform historical work and how historical activities can benefit private sector organizations. It tracks historical projects seeking funding as well as projects underway and completed. It maintains online, publicly available, lists of events pertaining to IT history, IT history resources, an IT Honor Roll acknowledging more than 700 individuals who have made a noteworthy contribution ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Operating System Security
Operation or Operations may refer to: Arts, entertainment and media * ''Operation'' (game), a battery-operated board game that challenges dexterity * Operation (music), a term used in musical set theory * ''Operations'' (magazine), Multi-Man Publishing's house organ for articles and discussion about its wargaming products * ''The Operation'' (film), a 1973 British television film * ''The Operation'' (1990), a crime, drama, TV movie starring Joe Penny, Lisa Hartman, and Jason Beghe * ''The Operation'' (1992–1998), a reality television series from TLC * The Operation M.D., formerly The Operation, a Canadian garage rock band * "Operation", a song by Relient K from ''The Creepy EP'', 2001 Business * Business operations, the harvesting of value from assets owned by a business * Manufacturing operations, operation of a facility * Operations management, an area of management concerned with designing and controlling the process of production Military and law enforcement * ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


SHARE (computing)
SHARE Inc. is a volunteer-run user group for IBM mainframe computers that was founded in 1955 by Los Angeles-area users of the IBM 701 computer system. It evolved into a forum for exchanging technical information about programming languages, operating systems, database systems, and user experiences for enterprise users of small, medium, and large-scale IBM computers such as IBM S/360, IBM S/370, zSeries, pSeries, and xSeries. Despite the capitalization of all letters in the name, the official website says "SHARE is not an acronym; it's what we do." Overview A major resource of SHARE from the beginning was the SHARE library. Originally, IBM distributed what software it provided in source form and systems programmers commonly made small local additions or modifications and exchanged them with other users. The SHARE library and the process of distributed development it fostered was one of the major origins of open source software. In 1959 SHARE released the SHARE Operating Syst ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




ACF/VTAM
Virtual Telecommunications Access Method (VTAM) is the IBM subsystem that implements Systems Network Architecture (SNA) for mainframe environments. VTAM provides an application programming interface (API) for communication applications, and controls communication equipment such as adapters and controllers. In modern terminology, VTAM provides a communication stack and device drivers. History VTAM was introduced in 1974 after a series of delays as a major component of SNA along with the 370x Network Control Program (NCP) and Synchronous Data Link Control (SDLC). In IBM terminology, VTAM is an access method software allowing application programs to read and write data to and from external devices. It is called 'virtual' because it was introduced at the time when IBM was introducing virtual storage by upgrading the operating systems of the System/360 series to virtual storage versions. VTAM was supposed to be the successor to the older telecommunications access methods, such ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

University Of Illinois
The University of Illinois Urbana-Champaign (U of I, Illinois, University of Illinois, or UIUC) is a public land-grant research university in Illinois in the twin cities of Champaign and Urbana. It is the flagship institution of the University of Illinois system and was founded in 1867. Enrolling over 56,000 undergraduate and graduate students, the University of Illinois is one of the largest public universities by enrollment in the country. The University of Illinois Urbana-Champaign is a member of the Association of American Universities and is classified among "R1: Doctoral Universities – Very high research activity". In fiscal year 2019, research expenditures at Illinois totaled $652 million. The campus library system possesses the second-largest university library in the United States by holdings after Harvard University. The university also hosts the National Center for Supercomputing Applications and is home to the fastest supercomputer on a university campus. The u ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Discretionary Access Control
In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria (TCSEC) as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control). Discretionary access control is commonly discussed in contrast to mandatory access control (MAC). Occasionally, a system as a whole is said to have "discretionary" or "purely discretionary" access control when that system lacks mandatory access control. On the other hand, systems can implement both MAC and DAC simultaneously, where DAC refers to one category of access controls that subjects can transfer among each other, and MAC refers to a second category of access controls that imposes constraint ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

London, Ontario
London (pronounced ) is a city in southwestern Ontario, Canada, along the Quebec City–Windsor Corridor. The city had a population of 422,324 according to the 2021 Canadian census. London is at the confluence of the Thames River, approximately from both Toronto and Detroit; and about from Buffalo, New York. The city of London is politically separate from Middlesex County, though it remains the county seat. London and the Thames were named in 1793 by John Graves Simcoe, who proposed the site for the capital city of Upper Canada. The first European settlement was between 1801 and 1804 by Peter Hagerman. The village was founded in 1826 and incorporated in 1855. Since then, London has grown to be the largest southwestern Ontario municipality and Canada's 11th largest metropolitan area, having annexed many of the smaller communities that surround it. London is a regional centre of healthcare and education, being home to the University of Western Ontario (which brands it ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

London Life Insurance
The Canada Life Assurance Company, commonly known as Canada Life, is an insurance and financial services company with its headquarters in Winnipeg, Manitoba. The current company is the result of the 2020 Consolidation (business), amalgamation of The Great-West Life Assurance Company, London Life Insurance Company and The Canada Life Assurance Company, along with their holding companies (London Insurance Group Inc. and Canada Life Financial Corporation). The company is a wholly owned subsidiary of Great-West Lifeco. History and ownership Great-West Life Assurance Company The Great-West Life Assurance Company (French: ''La Great-West, Compagnie d'Assurance-vie'') provided life, disability, and health insurance; benefit and retirement plans; and investment advice. It was active in both the United States and Canada. Great-West Life was founded in Winnipeg in 1891 by Jeffry Hall Brock, a local insurance agent. The company was incorporated on August 28, 1891, with local residents s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]