IBM Systems Journal - 2002 Copyright
IBM Skip to main content
  Home     Products & services     Support & downloads     My account  
  Select a country  
Journals Home  
  Systems Journal  
    Current Issue  
    Recent Issues  
    Papers in Progress  
    Author's Guide  
Journal of Research
and Development
  Contact Us  
  Related links:  
     IBM Research  
IBM Systems Journal

Browse by Subject

Show details for ArchitectureArchitecture
Show details for Based SystemsBased Systems
Show details for Business PlanningBusiness Planning
Show details for CommunicationsCommunications
Show details for DatabaseDatabase
Show details for Distributed ProcessingDistributed Processing
Show details for EnvironmentsEnvironments
Show details for EssayEssay
Show details for General ApplicationsGeneral Applications
Show details for Graphics and ImageGraphics and Image
Show details for Human FactorsHuman Factors
Show details for KnowledgeKnowledge
Show details for LanguagesLanguages
Show details for ManagementManagement
Show details for Mathematical MethodsMathematical Methods
Show details for MultimediaMultimedia
Show details for NetworkingNetworking
Show details for Office ApplicationsOffice Applications
Show details for Operating SystemsOperating Systems
Show details for PerformancePerformance
Show details for Personal SystemsPersonal Systems
Show details for ProcessProcess
Show details for ProgrammingProgramming
Show details for Reliability and AvailabilityReliability and Availability
Hide details for SecuritySecurity
1993A public key extension to the Common Cryp-tographic Architecture
1993Technical note—Complementarity attacks and control vectors
1991A key-management scheme based on control vectors
1991Common Cryptographic Architecture Cryptographic Application Programming Interface
1991ESA/390 Integrated Cryptographic Facility: An overview
1991Key handling with control vectors
1991Transaction Security System extensions to the Common Cryptographic Architecture
1991Transaction Security System
1990Exponentiation cryptosystems on the IBM PC
1984An overview of computer security
1984Security considerations for personal computers
1980Data base security: requirements, policies, and models
1980The IPS cryptographic programs
1979Virtual Control Storage-curity measures in VM/370
1978A cryptographic key management scheme for implementing the Data Encryption Standard
1978Cryptography architecture for information security
1978Generation, distribution, and installation of cryptographic keys
1976Penetrating an operating system: a study of VM/370 integrity
1975An access control mechanism for computing resources
1975Generalized audit trail requirements and concepts for data base applications
1975Hierarchical approach to computer system integrity
1971A large-scale interactive administrative system
1970The authorization problem in shared files
Show details for SimulationSimulation
Show details for StandardsStandards
Show details for Storage SystemsStorage Systems
Show details for System DesignSystem Design
Show details for TestingTesting
Show details for (No Subject)(No Subject)