G. M. Dolan’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


Common Cryptographic Architecture Cryptographic Application Programming Interface
  • Article

February 1991

·

72 Reads

·

22 Citations

IBM Systems Journal

D. B. Johnson

·

G. M. Dolan

·

M. J. Kelly

·

[...]

·

Cryptography is considered by many users to be a complicated subject. An architecture for a cryptographic application programming interface simplifies customer use of cryptographic services by helping to ensure compliance with national and international standards and by providing intuitive high-level services that may be implemented on a broad range of operating systems and underlying hardware. This paper gives an overview of the design rationale of the recently announced Common Cryptographic Architecture Cryptographic Application Programming Interface and gives typical application scenarios showing methods of using the services described in the architecture to meet security requirements.


Transaction Security System

February 1991

·

139 Reads

·

160 Citations

IBM Systems Journal

Components of previous security systems were designed independently from one another and were often difficult to integrate. Described is the recently available IBM Transaction Security System. It implements the Common Cryptographic Architecture and offers a comprehensive set of security products that allow users to implement end-to-end secure systems with IBM components. The system includes a mainframe host-attached Network Security Processor, high-performance encryption adapters for the IBM Personal Computer and Personal System/2® Micro Channel®, an RS-232 attached Security Interface Unit, and a credit-card size state-of-the-art Personal Security™ card containing a high-performance microprocessor. The application programming interface provides common programming in the host and the workstation and supports all of the Systems Application Architecture™ languages except REXX and RPG. Applications may be written to run on Multiple Virtual Storage (MVS) and PC DOS operating systems.


Transaction Security System extensions to the Common Cryptographic Architecture

February 1991

·

10 Reads

·

7 Citations

IBM Systems Journal

A well-designed application program interface for a line of cryptographic products simplifies customer use of cryptographic services by helping to ensure compliance with national and international standards and by providing intuitive high-level services that may be implemented on disparate systems. The Common Cryptographic Architecture is IBM's strategic cryptographic architecture. The Transaction Security System implements the Common Cryptographic Architecture in full. Furthermore, the Transaction Security System has implemented extensions to the architecture to address additional customer requirements. This paper gives the design rationale for some of the additional cryptographic functionality in the Transaction Security System beyond that mandated by the Common Cryptographic Architecture.

Citations (3)


... TSS saw the introduction of the IBM Common Cryptographic Architecture (CCA), a carefully architected set of cryptographic functions and application programming interfaces (APIs) that provide both general-purpose functions and a broad set of functions designed specifically to secure financial transactions. CCA introduced strong key typing and related key-management functions which prevented many attacks that had been possible with earlier systems based only on the basic cryptographic algorithms themselves [2,3]. ...

Reference:

The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer
Transaction Security System extensions to the Common Cryptographic Architecture
  • Citing Article
  • February 1991

IBM Systems Journal

... The intruder is divided into types according to the following areas of influence: Type 0 -exploits social engineering attacks; Type 1 -remote access using global Internet protocols; Type 3remote access using IR, Bluetooth, RFID, NFC, etc.; Type 4 -access via wired device interfaces such as RS-232, microUSB, microcontroller hardware pins, external devices, etc.; Type 5 -full direct access to the device [24]. The intruder is also divided into three levels of capability: level 1 -exploiting known vulnerabilities and attack scenarios, as well as using simple, widely accepted utilities such as Nmap; level 2 -using specialised attack tools; level 3 -essentially a group of level 2 intruders with unlimited financial, computing and hardware resources [25]. As a result, mapping intruder categories to specific assets of the smart city infrastructure allows filtering out only those categories of potential intruders that are relevant to the infrastructure under consideration. ...

Transaction Security System
  • Citing Article
  • February 1991

IBM Systems Journal

... IBM's Common Cryptographic Architecture (CCA) [19, 18] is a token interface primarily used by banks for securing ATM networks and financial transactions; it is provided by the IBM 4764 cryptoprocessor and its predecessors. CCA defines a control vector for every key that models key usage and other attributes, and introduced a method for binding the control vector securely to a wrapped key. ...

Common Cryptographic Architecture Cryptographic Application Programming Interface
  • Citing Article
  • February 1991

IBM Systems Journal