EditWYSIWYGAttach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
2629 Dec 2015 - 18:17ThomasMisa 
2529 Dec 2015 - 18:16ThomasMisa 
2424 Sep 2015 - 12:24ThomasMisa 
2324 Sep 2015 - 12:21ThomasMisa 
2224 Sep 2015 - 12:19ThomasMisa 
2124 Sep 2015 - 12:14ThomasMisa 
2028 Jul 2015 - 11:55ThomasMisa 
1928 Jul 2015 - 11:52ThomasMisa 
1805 Jun 2015 - 17:33ThomasMisa 
1705 Jun 2015 - 17:32ThomasMisa 
earlier first

Render style:     Context:


 History: r26 | r19 < r18 < r17 < r16
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Publications>CSHW14>CSHW14Pub (revision 17)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Workshop (home) Workshop Participants Workshop Papers Workshop Photos Workshop publication

Publication of Computer Security History Workshop (July 2014) CSHW 14

Papers at CSHW 14 were extensively discussed, revised by authors, and were submitted to IEEE Annals of the History of Computing to be considered for two "special issues" of the journal on the history of computer security.

NEW An update as of 4 June 2015: the six papers that have passed peer review (listed below) are published in IEEE Annals of the History of Computing volume 37 no. 2 (2015) issue (see cover to right). The remaining papers are in the midst of the peer review process.

  • Jeffrey Yost, "Computer Security" (Guest editors' introduction) IEEE Annals of the History of Computing 37 no. 2 (2015): 6-7 doi lock Yost-intro (log-in required)

  • Michael Warner, "Notes on the Evolution of Computer Security Policy in the US Government, 1965-2003" IEEE Annals of the History of Computing 37 no. 2 (2015): 8-18 doi lock Warner-policy (log-in required)

  • Steve Lipner, "The Birth and Death of the Orange Book" IEEE Annals of the History of Computing 37 no. 2 (2015): 19-31 doi lock Lipner-orange (log-in required)

  • Rebecca Slayton, “Measuring Risk: Computer Security Metrics, Automation, and Learning.” IEEE Annals of the History of Computing 37 no. 2 (2015): 32-45 doi lock Slayton.pdf (log-in required)

  • Jeffrey Yost, "The Origin and Early History of the Computer Security Software Products Industry" IEEE Annals of the History of Computing 37 no. 2 (2015): 46-58 doi lock Yost-origin (log-in required)

  • Dongoh Park, “Social Life of PKI: Sociotechnical Development of Korean Public-Key Infrastructure.” IEEE Annals of the History of Computing 37 no. 2 (2015): 59-71 doi lock Park-PKI (log-in required)

  • Laura DeNardis, “The Internet Design Tension between Surveillance and Security.” IEEE Annals of the History of Computing 37 no. 2 (2015): 72-83 doi lock Denardis-tension (log-in required)

Copyrighted versions of the papers appear in the password-protected page (log-in required). Please click on sign up to log in -- or contact your local library for access to the IEEE Digital Library.

-- ThomasMisa - 05 Jun 2015

Supported by the National Science Foundation CNS--TC 1116862 "Building an Infrastructure for Computer Security History."

Topic attachments
I Attachment Action SizeSorted descending Date Who Comment
pdfpdf anhc-37-02-C1.pdf manage 2058.6 K 04 May 2015 - 13:15 ThomasMisa Annals cover
jpgjpg anhc-37-02-C1.jpg manage 611.6 K 04 May 2015 - 13:17 ThomasMisa Annals cover -- ware
Edit | WYSIWYG | Attach |  PDF |  History: r26 | r19 < r18 < r17 < r16 |  Backlinks |  Raw View | More topic actions...
Topic revision: r17 - 05 Jun 2015 - 17:32:31 - ThomasMisa
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback