NSF SaTC PI 2015
Charles Babbage Institute

Next Article

Previous Article


Table of Contents


CBI Home

Yost Attends NSF SaTC PI 2015

CBI associate director Jeffrey Yost attended and presented a poster at the National Science Foundation’s Secure and Trustworthy Cyberspace (SaTC) Principal Investigators Conference in Arlington, Virginia, in early January 2015.  The event (held biennially) brought together NSF SaTC-funded investigators to present results, network, share ideas, and plan for the future. 

Jeremy Epstein, SaTC Director

The three-day conference, led by SaTC program director Jeremy Epstein and attended by more than 400 investigators, included keynote talks, breakout discussions, “rapid-fire cross-collaborations,” and regular, poster, and “birds of a feather” sessions on many key topics in computer security and privacy.  Among the highlights, Chief Information Security Officer of In-Q-Tel Dan Geer presented, “T.S. Kuhn Revisited,” in which he examined the history of computer security within the context of Kuhn’s concepts of “normal science,” “extraordinary science,” and “paradigm shifts,” and in a closing plenary session, former NSF Trustworthy Computing (SaTC’s prior name) director Carl Landwehr explored how—despite many achievements in computer security research—the field’s largest problems have been constant over the past decade and a half.

SaTCposterYost’s poster highlighted the accomplishments of CBI’s “Building an Infrastructure for Computer Security History,” a SaTC-funded project he co-leads with CBI director Tom Misa.  To date 27 of the planned 30 oral histories have been conducted (with many of the foremost computer security pioneers, including Rebecca Bace, Terry Benzel, David Bell,  Dorothy Denning, Peter Denning, Butler Lampson, Carl Landwehr, Steve Lipner, Teresa Lunt, Peter Neumann, Roger Schell, and Gene Spafford).  The full text of these interviews—typically 2 to 4 hour interviews with 70 to 150 page edited transcripts—are available at www.cbi.umn.edu/oh.   The first of our two Computer Security special issues of IEEE Annals of the History of Computing (April-June 2015) will be out shortly and features seminal scholarship on the history of cryptography, computer security standards, network security, computer security and policy-making, and the computer security industry.  The articles richly explore the many social, cultural, political, economic, and institutional contexts to computer security (see the following article). As with the second special issue (to be published in 2016), it is composed of revised papers from CBI’s “Computer Security History Workshop,” held at the institute in July 2014.   In addition to facilitating and editing scholarship of an emerging computer security history community, the project team has been actively publishing. Yost has two peer-reviewed articles coming out, GSRA Nic Lewis one, and Misa, Yost, and Lewis have more in the works.   Our project’s Computer Security Wiki—detailing the history of key people, events, ideas, and systems—has been receiving thousands of page views per month. The Wiki is at <tinyurl.com/cbi-secure>. And our archival collecting effort has yielded many important materials donated by Steve Lipner, Stephen Lukasik, Lance Hofffman, and others.



Back to Top | Next Article | Previous Article