Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
1623 Jun 2015 - 12:43ThomasMisa 
1505 Jun 2015 - 16:24ThomasMisa 
1416 Mar 2015 - 13:38ThomasMisa 
1316 Mar 2015 - 13:36ThomasMisa 
1216 Mar 2015 - 13:35ThomasMisa 
1116 Mar 2015 - 13:32ThomasMisa 
1004 Mar 2015 - 10:47ThomasMisa 
913 Jan 2015 - 10:11ThomasMisa 
819 Dec 2014 - 15:09ThomasMisa 
701 Dec 2014 - 18:58ThomasMisa 
earlier first

Render style:     Context:


 History: r16 < r15 < r14 < r13 < r12
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Publications>CSHW14 (revision 16)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Workshop (home) Workshop Participants Workshop Papers Workshop Photos Workshop publication

Computer Security History Workshop (July 2014) CSHW 14

On July 11-12, 2014, the Charles Babbage Institute held a workshop for historians and computer-security professionals. Papers presented at the workshop were reviewed for publication in IEEE Annals of the History of Computing (NEWthe first of two special editions is now published here).
Write-ups appear in the Fall 2014 externalCBI Newsletter and also in the January 2015 issue of externalIEEE Annals of the History of Computing.
These pages give an overview of the workshop -- participants, papers, publication -- as well as 30 photographs of the event.

The Charles Babbage Institute, supported by the National Science Foundation’s Trustworthy Computing program, is engaged in a multi-year research project, “Building an Infrastructure for Computer Security History.” The project entails conducting 30 oral histories with computer-security pioneers, creating knowledge networking resources, building archival collections, and preparing a set of scholarly publications. On July 11-12, 2014 CBI held a workshop to facilitate and advance scholarship and understanding of computer security history.

An open call for papers yielded high quality proposals in a range of topics and themes -- from computer crime, security metrics, standards, and encryption to pioneering companies, privacy, internet design, and hacker culture. Proposals came in from historians, computer scientists, information scholars, and industry pioneers. At CBI we organized the papers into four thematic sessions : Conceptual Foundations, Industry Foundations, Law and Privacy, and Identity and Anonymity. Sessions on Friday July 11 were followed by a workshop dinner, with the final session and workshop wrap-up on Saturday, July 12.

During the workshop sessions, oral presentations were kept brief since all attendees had texts readily at hand in the printed workshop volume. Discussion centered on providing feedback to authors in preparation for publication. The editorial board of IEEE Annals of the History of Computing approved plans for two special issues to publish revised papers from the event. All papers go through the journal’s standard peer review. Past IEEE Annals editor-in-chief and CBI associate director Jeffrey Yost will guest edit the two special issues.

Additional results from CBI’s NSF-funded research project include journal articles by co-PI Jeff Yost and graduate-student research assistant Nicholas Lewis that are forthcoming in IEEE Annals; the set of completed oral-history interviews; and this knowledge-networking wiki ( with a alias to this wiki tinyurl.com/cbi-secure ).

 

__ustrade_14918862_cover-crop.jpg

Supported by the National Science Foundation CNS--TC 1116862 "Building an Infrastructure for Computer Security History."

Topic attachments
I AttachmentSorted ascending Action Size Date Who Comment
jpgjpg __ustrade_14918862_cover-crop.jpg manage 386.1 K 17 Nov 2014 - 20:57 ThomasMisa CSHW 14 workshop volume cover--cropped
jpgjpg __ustrade_14918862_cover.jpg manage 774.0 K 17 Nov 2014 - 20:54 ThomasMisa CSHW 14 workshop volume cover
Topic revision: r16 - 23 Jun 2015 - 12:43:21 - ThomasMisa
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback