Scheduled Maintenance on March 25th, 2017:
Single article purchases and IEEE account management will be unavailable from 4:00 AM until 6:30 PM (ET). We apologize for the inconvenience.
By Topic

IBM Systems Journal

Issue 2 • 1978

Filter Results

Displaying Results 1 - 8 of 8
  • Preface

    Publication Year: 1978, Page(s):104 - 105
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (730 KB)

    The papers presented in this issue address the subject of security. They were selected from a technical symposium conducted in October 1977 by the IBM Systems Journal and the IBM Systems Research Institute. The objective of the symposium was to examine systems security from the viewpoints of controllability, auditability, recoverability, protectability, and the interrelationships among them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cryptographic key management scheme for implementing the Data Encryption Standard

    Publication Year: 1978, Page(s):106 - 125
    Cited by:  Papers (20)  |  Patents (20)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1794 KB)

    A key management protocol has been described that will allow the Data Encryption Standard (DES) to be integrated into electronic data processing systems for the purpose of obtaining communication security and file security. Several cryptographic keys have been defined that allow the desired key management protocol to be achieved. They are: • Host master key (KMO) • First variant of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation, distribution, and installation of cryptographic keys

    Publication Year: 1978, Page(s):126 - 137
    Cited by:  Papers (13)  |  Patents (11)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1487 KB)

    In connection with the key management scheme discussed by Ehrsam et al. in the preceding paper,1 we have described two kinds of keys: • Data-encrypting keys, which protect either data in transit (primary communication keys, or session keys) or stored data (primary file keys, or file keys); • Key-encrypting keys, which encipher other keys—for example, host master key... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptography architecture for information security

    Publication Year: 1978, Page(s):138 - 150
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1552 KB)

    SNA provides the foundation for the orderly movement of information from source to destination in a communications network. The addition of a cryptography function, as a means of protecting information from disclosure or deliberate modification during passage through the network, affects the architecture in terms of selection, distribution, and verification of the function. By associating cryptogr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Administrative control of computing service

    Publication Year: 1978, Page(s):151 - 178
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2282 KB)

    The administrative interface to a computer facility, which includes control of access to each valuable resource, must provide a large variety of functions to many classes of users, and it must be adaptable to a large variety of installations. This problem can be regarded as nothing more than a design challenge for a special purpose data base/data communications application. This paper, together wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data processing spheres of control

    Publication Year: 1978, Page(s):179 - 198
    Cited by:  Papers (19)  |  Patents (10)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1887 KB)

    The designers of the semantics of applications are concerned mainly with spheres of control. Concern for performance is a strong second. It is not unusual to eliminate automation of an application if adequate performance can be achieved only by ignoring the spheres of control presented. The application is then done manually or not at all. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authors

    Publication Year: 1978, Page(s):199 - 200
    IEEE is not the copyright holder of this material | PDF file iconPDF (597 KB)
    Freely Available from IEEE
  • Abstracts

    Publication Year: 1978, Page(s):201 - 202
    IEEE is not the copyright holder of this material | PDF file iconPDF (779 KB)
    Freely Available from IEEE

Aims & Scope

Throughout its history, the IBM Systems Journal has been devoted to software, software systems, and services, focusing on concepts, architectures, and the uses of software.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
John J. Ritsko
IBM T. J. Watson Research Center5