On 17 March 2015 at 10:52, John McKown <[email protected]> wrote:
>> Of course, after this snippet the authorized section cannot trust the 
>> contents
>> of any key8 storage.
>>
>
> Yes, I can see how that can be true. Of course, I don't know of a
> _good_ method to ensure memory protection from a "rogue" program which
> runs in the same address space as a trusted program.

Well there is the key9 scheme (officially
"Storage-Protection-Override") that CICS uses. Whether it's hardened
enough to protect against a malicious -- as opposed to "possibly
erroneous" as the POO puts it --  problem program, I don't know.

Tony H.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to