A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Godel, Escher, Bach: An Eternal Golden Braid
Godel, Escher, Bach: An Eternal Golden Braid
Hi-index | 0.00 |
This paper will describe various methods to secure an APL database application. Primary foci will be in the areas of “physical” protection, and in cryptographic techniques. To that end, distinctions will be made between “data,” and “information.” Because of those differences, specific methods will be offered which are appropriate for each modality of security. A brief set of examples will be included for the use of IBM's1 RACF2 (Resource Access Control Facility). Also, a description of a Public Key Cryptographic function, implemented in APL, will be offered. Finally, these will be combined into a database scenario, applicable to products like APLDI23 (APL Data Interface).