Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
420 Feb 2015 - 12:29ThomasMisa 
329 Jan 2015 - 09:56ThomasMisa 
229 Jan 2015 - 09:53ThomasMisaAttached file IEEESecurityPrivacy_LostTreasures-2013_06375719.pdf 
128 Jan 2015 - 16:42ThomasMisa 

Render style:     Context:


 History: r4 < r3 < r2 < r1
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>ToDoList>ReadingBackground (20 Feb 2015, ThomasMisa)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Background reading on computer-security history

(see also "References Cited" in original NSF proposal):

  • Ronald E. Doel & Thomas Söderqvist, The Historiography of Contemporary Science, Technology, and Medicine: Writing Recent Science (Routledge, 2006)
  • Ludmilla Jordanova, History in Practice (Hodder, 2006; 2nd edition)

  • Donald MacKenzie, "Covert Channels" chapter 5 in Mechanizing Proof (MIT 2001) -- one of two historical-scholarly pieces on computer security; see Yost 2007
  • MacKenzie, D. and G. Pottinger. "Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military." IEEE Annals of the History of Computing 19 no. 3 (1997): 41-59.
  • Jeff Yost "A History of Computer Security Standards." In K. de Leeuw and J. Bergstra, eds. The History of Information Security: A Comprehensive Handbook (Elsevier 2007), 595-621. on CBI upstairs shelves
  • Diffie, W. “The First Ten Years of Public-Key Cryptography.” Proceedings of the IEEE 76 no. 5 (May 1988): 560-577.
  • Diffie, W. and M. E. Hellman. “New Directions in Cryptography.” IEEE Transactions on Information Theory IT-22 (1976): 644-654.
  • Levy, S. Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age (Viking 2001). readable journalistic treatment of public key crypto
  • Parker, D.B. “The Dark Side of Computing: SRI International and the Study of Computer Crime.” IEEE Annals of the History of Computing 29 no. 1 (2007): 3-15.


  • Dan Thomsen, Jeremy Epstein, and Peter G. Neumann "LostTreasures" special issue IEEE Security & Privacy 10 no 6 . . .
    • Lipner, S. ; Jaeger, T. ; Zurko, M.E. "Lessons from VAX/SVS for High-Assurance VM Systems." IEEE Security & Privacy 10 no 6 DOI 2012 Lost Treasures
    • Murdoch, S.J. ; Bond, M. ; Anderson, R. "How Certification Systems Fail: Lessons from the Ware Report" IEEE Security & Privacy 10 no 6 DOI 2012 Lost Treasures
    • Smith, R.E. "A Contemporary Look at Saltzer and Schroeder's 1975 Design Principles" IEEE Security & Privacy 10 no 6 DOI 2012 Lost Treasures
    • Shrobe, H. ; Adams, D. "Suppose We Got a Do-Over: A Revolution for Secure Computing" IEEE Security & Privacy 10 no 6 DOI 2012 Lost Treasures

Topic attachments
I Attachment Action Size Date WhoSorted ascending Comment
pdfpdf IEEESecurityPrivacy_LostTreasures-2013_06375719.pdf manage 713.0 K 29 Jan 2015 - 09:53 ThomasMisa IEEE Security & Privace "Lost Treasures" special issue
Topic revision: r4 - 20 Feb 2015 - 12:29:11 - ThomasMisa
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback