Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal30 (2):206-229,1991.Type:Article
Date Reviewed: Mar 1 1992

IBM’s relatively new Transaction Security System implements the Common Cryptographic Architecture and offers a comprehensive set of security products that allow users to implement end-to-end secure systems with IBM components. The system includes a mainframe host-attached Network Security Processor, high-performance encryption adapters for the IBM Personal Computer and PS/2 Micro Channel, an RS-232-attached Security Interface unit, and a credit-card-size state-of-the-art Personal Security card containing a high-performance microprocessor. The application programming interface provides common programming in the host and the workstation and supports all the Systems Application Architecture languages except REXX and RPG. Applications may be written to run on MVS and PC-DOS operating systems.

The paper does an excellent job of providing product information, its primary purpose. Due to its detail, it is rather long. It is well organized and thorough, contains good background material, and includes diagrams that enhance understanding.

The intended audience would be computing professionals who are responsible for maintenance and installation of secure systems or who like to be well informed and current on the available security systems. Both cited references and general references are good. The form and content are very good. All in all, the paper does a thorough job of presenting information on a product.

Reviewer:  Marlene Campbell Review #: CR115492
Bookmark and Share
Would you recommend this review?
Other reviews under "Cryptographic Controls": Date
Security analysis of the SAML single sign-on browser/artifact profile
Gross T.  Computer security applications (Proceedings of the 19th Annual Computer Security Applications Conference, Dec 8-12, 2003)2982003. Type: Proceedings
Feb 3 2005
Cybercryptography: applicable cryptography for cyberspace security
Yan S., Springer International Publishing, New York, NY, 2019.  436, Type: Book (978-3-319725-34-5), Reviews: (2 of 2)
Aug 24 2020
Secure group communications over data networks
Zou X., Ramamurthy B., Magliveras S., Springer-Verlag Telos, 2004.  172, Type: Book (9780387229706)
Mar 1 2006

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 2004™
Terms of Use
| Privacy Policy