Browse Prior Art Database

Data Security Technologies in SAS 9.1.2

IP.com Disclosure Number: IPCOM000243183D
Original Publication Date: 2004-Dec-31
Included in the Prior Art Database: 2015-Sep-17

Publishing Venue

SAS Institute Inc.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 6% of the total text.

Page 01 of 55

Data Security Technologies in SAS® 9.1.2



Page 02 of 55

The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. Data Security Technologies in SAS® 9.1.2. Cary, NC: SAS Institute Inc.

Data Security Technologies in SAS® 9.1.2

Copyright © 2004, SAS Institute Inc., Cary, NC, USA


ISBN 1-59047-494-5
All rights reserved. Produced in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc.

U.S. Government Restricted Rights Notice. Use, duplication, or disclosure of this software and related documentation by the U.S. government is subject to the Agreement with SAS Institute and the restrictions set forth in FAR 52.227-19 Commercial Computer Software-Restricted Rights (June 1987).

SAS Institute Inc., SAS Campus Drive, Cary, North Carolina 27513.
1st printing, April 2004
SAS Publishing provides a complete selection of books and electronic products to help customers use SAS software to its fullest potential. For more information about our e-books, e-learning products, CDs, and hard-copy books, visit the SAS Publishing Web site at support.sas.com/pubs or call 1-800-727-3228.

SAS® and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration.

Other brand and product names are registered trademarks or trademarks of their respective companies.


Page 03 of 55

P A R T 1 Data Security Technologies in SAS 9.1.2. 1
Chapter 1

4 Technologies for Data Security 3

Data Security Technologies: Overview 3

Data Security Technologies: Encryption Providers 4

Data Encryption Algorithms 7

Data Security Technologies: Comparison 8

Data Security Technologies: Implementation 8

Chapter 2

      4 SAS System Options for Data Security 9 Chapter 3

      4 Data Security Technologies: Examples 21 SAS/SECURE for SAS/CONNECT: Example 21

SASProprietary for SAS/SHARE: Example 22

SSL for a SAS/CONNECT UNIX Spawner: Example 22

SSL for a SAS/CONNECT Windows Spawner: Example 24

SSL for SAS/SHARE under UNIX: Example 26

SSL for SAS/SHARE under Windows: Examples 27

SAS/SECURE for the IOM Bridge: Examples 28

Contents

P A R T 2 Installing and Configuring SSL 31

Appendix 1

4 Installing and Configuring SSL under UNIX 33

SSL under UNIX: System and Software Requirements 33

Setting Up Digital Certificates for SSL under UNIX 34

Converting between PEM and DER File Formats for SSL 38

Appendix 2

       4 Installing and Configuring SSL under Windows 39 SSL under Windows: System and Software Requirements 39

Setting Up Digital Certificates for SSL under Windows 39

Converting between PEM and DER File Formats for SSL 43

Glossary 45 Index 47

What's New v

Overview to Data Security Technologies v

Details about Data Security Technologies v


Page 04 of 55...