Computer Security Workshop
Charles Babbage Institute

Next Article

Previous Article


Table of Contents


CBI Home

CBI Computer Security History Workshop

CSHW group
Workshop participants (left to right). Rebecca G. Bace, James W. Cortada, Jonathan S. Clemens, Dongoh Park, Jeffrey Yost, Will Vogel, Michael Warner, William H. Murray, Steven B. Lipner, Terry Benzel, Andrew Meade McGee, Carl Landwehr, William F. Aspray, Nathan Ensmenger, Breck Walker, Laura DeNardis. Front row: Thomas Misa, Robert E. Johnston, Karl Grindal, Jeremy Epstein, William Scherlis, Philip Frana, Rebecca Slayton. Not pictured: Andrew Odlyzko.

On July 11-12, 2014 the Charles Babbage Institute held a workshop to facilitate and advance scholarship and understanding of computer security history.  The workshop was sponsored by the National Science Foundation (NSF CNS-TC 1116862) as a supplement to CBI’s multi-year research project, “Building an Infrastructure for Computer Security History.”

An open call for papers yielded high quality proposals in a range of themes and topics—from computer crime, security metrics, standards, and encryption to pioneering companies, privacy, internet design, and hacker culture. Proposals came in from historians, computer scientists, information scholars, and industry pioneers.  At CBI we organized the papers, printed in a privately circulated workshop volume, into four thematic sessions: Conceptual Foundations, Industry Foundations, Law and Privacy, and Identity and Anonymity.  Sessions on Friday July 11, were followed by a workshop dinner at the University of Minnesota’s Campus Club, with the fourth session and workshop wrap-up on Saturday, July 12.

During the workshop sessions, oral presentations were kept brief since all attendees had texts readily at hand.  Discussion centered on providing feedback to authors in preparation for publication. The editorial board of IEEE Annals of the History of Computing approved plans for two special issues to publish revised papers from the event.  All papers go through the journal’s standard peer review.  Past IEEE Annals editor-in-chief and CBI associate director Jeffrey Yost will guest edit the two special issues.

American University’s Laura DeNardis.

Papers from the workshop:
William Aspray (University of Texas) “The Early History of Symantec, 1982-1999,” James W. Cortada (IBM retired, current-Charles Babbage Institute, University of Minnesota) “How an IT Industry is Born: Is this Happening with IT Security Firms?” Laura DeNardis (American University) “The Internet Design Tension between Surveillance and Security,” Larry Druffel, Rich Pethia, and Bill Scherlis (Software Engineering Institute, Carnegie Mellon University) “The Formation and Operation of CERT: A Retrospective,”  Philip Frana (James Madison University) “Telematics, Transborder Data Flows, and the History of Computer Security,” Karl Grindal (Cyber Conflict Studies Association) “Artist Collectives versus Hacker Culture: Origins of DDoS,”  Robert E. Johnston “Information Security History in the Private Sector, 1969-1999,” Steven B. Lipner (Microsoft) “The Birth and Death of the Orange Book,” Andrew Meade McGee (University of Virginia) “Privacy as Security: The Deep Political Origins of the Privacy Act of 1974,” Dongoh Park (Indiana University) “Social Life of PKI: Sociotechnical Development of Korean Public Key Infrastructure,” Rebecca Slayton (Cornell University) “Automating Judgment: Computer Security Metrics and the Rise of Risk Assessment,” Michael Warner (U.S. Cyber Command) “Notes on the Evolution of Computer Security Policy in the US Government, 1965-2001,” Jeffrey R. Yost (Charles Babbage Institute, University of Minnesota) “Access Control Software and the Origin and Early History of the Computer Security Industry.”

Additional results from CBI’s NSF-funded research project include journal articles by co-PI Jeffrey Yost and graduate-student research assistant Nic Lewis forthcoming in IEEE Annals; the set of two dozen completed oral-history interviews ; and a unique compilation of knowledge-networking resources about computer security.


Back to Top | Next Article | Previous Article