View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
May 20, 1987

X/OPEN HAS STANDARDS PLANS FOR SECURITY TRANSACTION PROCESSING AND NETWORKING

By CBR Staff Writer

The X/Open Group dedicated to portability of European applications across the Unix machines offered by its members, plans announcements in the key areas of networking, transaction processing and security this year, technical manager Mike Lambert has been saying. Speaking at The Instruction Set Unix Directions conference, he said that the effort in the networking area – where the Group had to back off on early optimism to wait for standards definition work to catch up – would result in the publication of two trial use definitions during 1987. He refused to elaborate, but the Group has been working with others to arrive at protocol-independent interfaces at the level of the ISO CASE services and IBM’s SNA LU 6.2. X/Open has adopted the trial use idea – comparable with the IEEE trial use standards – to publish definitions not ready for inclusion in the Portability Guide. The first of the promised announcements, however, is likely to be at Comunix this month about the work in the transaction processing area, where X/Open contracted Data Logic to do a study. Lambert indicated that the general state of the market – little coherence and no dominant product – meant that it was early days yet. And in the security area, X/Open is involved in an effort to produce a commercial version of the US Department of Defense Orange Book defining security levels. While definitions are expected to map onto the US levels, he said that the jump between C2 and the much more rigorous B1 may mean that there is a place for further levels in between for commercial systems. Windowing is another area due for announcements before the summer. Finally the X/Open verification suite is in a late beta test phase.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU