EditWYSIWYGAttach PDF Raw View►More Actions▼More Actions

Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
605 Jun 2015 - 17:26ThomasMisa 
505 Jun 2015 - 17:24ThomasMisaAttached file Yost-intro_07116454.pdf 
405 Jun 2015 - 17:18ThomasMisaAttached file Lipner-orange_07116444.pdf

Attached file Warner-policy_07116433.pdf 
305 Jun 2015 - 17:08ThomasMisaAttached file Park-PKI_07116458.pdf

Attached file DeNardis-tension_07116471.pdf

Attached file Yost-origin_07116464.pdf 
205 Jun 2015 - 16:55ThomasMisa 
105 Jun 2015 - 16:55ThomasMisaAttached file Slayton-risk_07116460.pdf 

Render style:     Context:

 History: r6 < r5 < r4 < r3 < r2
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Publications>CSHW14>CSHW14Pub>CSHW14PubFiles (revision 3)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Workshop (home) Workshop Participants Workshop Papers Workshop Photos Workshop publication

Computer Security History Workshop (July 2014) CSHW 14

  • sss
  • sss
  • sss
  • sss
  • Rebecca Slayton, “Measuring Risk: Computer Security Metrics, Automation, and Learning.” IEEE Annals of the History of Computing 37 no. 2 (2015): 32 - 45
  • Jeffrey Yost, "The Origin and Early History of the Computer Security Software Products Industry" IEEE Annals of the History of Computing 37 no. 2 (2015): 46-58
  • Dongoh Park, “Social Life of PKI: Sociotechnical Development of Korean Public-Key Infrastructure.” IEEE Annals of the History of Computing 37 no. 2 (2015): 59-71
  • Laura DeNardis, “The Internet Design Tension between Surveillance and Security.” IEEE Annals of the History of Computing 37 no. 2 (2015): 72-83

Topic attachments
I Attachment Action Size Date Who Comment
pdfpdf DeNardis-tension_07116471.pdf manage 710.0 K 05 Jun 2015 - 17:02 ThomasMisa Denardis-tension
pdfpdf Park-PKI_07116458.pdf manage 971.2 K 05 Jun 2015 - 16:56 ThomasMisa Park-PKI
pdfpdf Slayton-risk_07116460.pdf manage 288.9 K 05 Jun 2015 - 16:47 ThomasMisa Slayton-risk
pdfpdf Yost-origin_07116464.pdf manage 237.4 K 05 Jun 2015 - 17:08 ThomasMisa Yost-origin
Edit | WYSIWYG | Attach |  PDF |  History: r6 < r5 < r4 < r3 < r2 |  Backlinks |  Raw View | More topic actions...
Topic revision: r3 - 05 Jun 2015 - 17:08:15 - ThomasMisa
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback