Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal30 (2):206-229,1991.Type:Article
Date Reviewed: Mar 1 1992

IBM’s relatively new Transaction Security System implements the Common Cryptographic Architecture and offers a comprehensive set of security products that allow users to implement end-to-end secure systems with IBM components. The system includes a mainframe host-attached Network Security Processor, high-performance encryption adapters for the IBM Personal Computer and PS/2 Micro Channel, an RS-232-attached Security Interface unit, and a credit-card-size state-of-the-art Personal Security card containing a high-performance microprocessor. The application programming interface provides common programming in the host and the workstation and supports all the Systems Application Architecture languages except REXX and RPG. Applications may be written to run on MVS and PC-DOS operating systems.

The paper does an excellent job of providing product information, its primary purpose. Due to its detail, it is rather long. It is well organized and thorough, contains good background material, and includes diagrams that enhance understanding.

The intended audience would be computing professionals who are responsible for maintenance and installation of secure systems or who like to be well informed and current on the available security systems. Both cited references and general references are good. The form and content are very good. All in all, the paper does a thorough job of presenting information on a product.

Reviewer:  Marlene Campbell Review #: CR115492
Bookmark and Share
 
Cryptographic Controls (D.4.6 ... )
 
 
User Interfaces (H.5.2 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
Cryptology: machines, history and methods
Deavours C., Kahn D., Kruh L., Mellen G. (ed), Winkel B. (ed) Artech House, Inc., Norwood, MA,1989. Type: Divisible Book
Jan 1 1992
Cryptography for computer security: making the decision
Fisher W. Computers and Security 3(3): 229-233, 1984. Type: Article
Jun 1 1985
A high speed manipulation detection code
Jueneman R.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)3461987. Type: Proceedings
Oct 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy