
Chapter 8. Autonomic computing 157
8.5 Self-protecting
Self-protecting features include:
LPAR
Intrusion detection IDS, PKI
Hardware cryptographic (coprocessors, accelerators and CP assist) adapters
Digital certificates providing identity authentication
SSL and TLS (manages Internet transmission security), Kerberos
(authenticates requests for service in a network), VPN, encryption
Tivoli Policy Director
LDAP (aids in the location of network resources)
HiperSockets™ Intrusion Detection Services (IDS) enables the detection of
attacks and the application of defensive mechanisms on the z/OS server.
Public Key Infrastructure (PKI) is embedded ...