By Topic

IBM Systems Journal

Issue 3 • 2001

Filter Results

Displaying Results 1 - 13 of 13
  • Preface

    Publication Year: 2001, Page(s):612 - 613
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (34 KB)

    Today most businesses and many individuals depend on the integrity of computer systems and networks. However, transactions and data can be vulnerable to assaults from both casual and malicious sources. From denial-of-service attacks to identity theft, pranksters and predators can interfere with our lives. Security measures are essential and can take many forms, from biometrics and smart cards for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing security and privacy in biometrics-based authentication systems

    Publication Year: 2001, Page(s):614 - 634
    Cited by:  Papers (275)  |  Patents (77)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3787 KB)

    Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing e-business applications using smart cards

    Publication Year: 2001, Page(s):635 - 647
    Cited by:  Papers (4)  |  Patents (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (375 KB)

    As the Internet is used increasingly as a platform for business transactions, security becomes a primary issue for Internet applications. Some applications are too sensitive for software-only security mechanisms. Higher levels of protection can be achieved with smart-card-based authentication schemes and transaction protocols. In this paper, we provide examples of typical banking applications impl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet public key infrastructure

    Publication Year: 2001, Page(s):648 - 665
    Cited by:  Patents (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (250 KB)

    Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern computi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separation of duties for access control enforcement in workflow environments

    Publication Year: 2001, Page(s):666 - 682
    Cited by:  Papers (34)  |  Patents (16)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2806 KB)

    Separation of duty, as a security principle, has as its primary objective the prevention of fraud and errors. This objective is achieved by disseminating the tasks and associated privileges for a specific business process among multiple users. This principle is demonstrated in the traditional example of separation of duty found in the requirement of two signatures on a check. Previous work on sepa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical server privacy with secure coprocessors

    Publication Year: 2001, Page(s):683 - 695
    Cited by:  Papers (21)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (193 KB)

    What does it take to implement a server that provides access to records in a large database, in a way that ensures that this access is completely private—even to the operator of this server? In this paper, we examine the question: Using current commercially available technology, is it practical to build such a server, for real databases of realistic size, that offers reasonable performance&... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security on z/OS: Comprehensive, current, and flexible

    Publication Year: 2001, Page(s):696 - 720
    Cited by:  Patents (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3661 KB)

    In this paper, we summarize and explain the security functions available to a typical enterprise computing installation using the IBM z/OS™ operating system and Security Server. The discussion is at a high level, aimed at enterprise decision makers and application architects. The intent is to explain the comprehensive security componentry within z/OS and to show how these techniques and fun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for the Internet Key Exchange Protocol

    Publication Year: 2001, Page(s):721 - 746
    Cited by:  Papers (5)  |  Patents (10)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (378 KB)

    In this paper we present the design, rationale, and implementation of the Internet Key Exchange (IKE) Protocol. This protocol is used to create and maintain Internet Protocol Security (IPSec) associations and secure tunnels in the IP layer. Secure tunnels are used to construct virtual private networks (VPNs) over the Internet. The implementation is done in the application layer. The design include... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for designing secure solutions

    Publication Year: 2001, Page(s):747 - 768
    Cited by:  Papers (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (349 KB)

    The task of developing information technology (IT) solutions that consistently and effectively apply security principles has many challenges, including: the complexity of integrating the specified security functions within the several underlying component architectures found in computing systems, the difficulty in developing a comprehensive set of baseline requirements for security, and a lack of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ethical hacking

    Publication Year: 2001, Page(s):769 - 780
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1329 KB)

    The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characteristics of production database workloads and the TPC benchmarks

    Publication Year: 2001, Page(s):781 - 802
    Cited by:  Papers (10)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (4791 KB)

    There has been very little empirical analysis of any real production database workloads. Although the Transaction Processing Performance Council benchmarks C (TPC-C™) and D (TPC-D™) have become the standard benchmarks for on-line transaction processing and decision support systems, respectively, there has not been any major effort to systematically analyze their workload characterist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Books

    Publication Year: 2001, Page(s):803 - 805
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Referees

    Publication Year: 2001, Page(s):806 - 808
    IEEE is not the copyright holder of this material | PDF file iconPDF (38 KB)
    Freely Available from IEEE

Aims & Scope

Throughout its history, the IBM Systems Journal has been devoted to software, software systems, and services, focusing on concepts, architectures, and the uses of software.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
John J. Ritsko
IBM T. J. Watson Research Center5