Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
108 Aug 2001 - 00:20PeterThoeny 

Render style:     Context:


 History: r1
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>WebChanges (16 Aug 2001, PeterThoeny?)

100 Recent Changes in CBI_ComputerSecurity Web retrieved at 12:26 (Local)

Statistics for nop CBI ComputerSecurity Web Month: Topic views: Topic saves: File uploads: Most popular topic views: Top contributors for ...
This is a working site for the Charles Babbage Institute's NSF funded project on the history of computer security. You can comment on and contribute to these pages ...
Publication of Computer Security History Workshop (July 2014) CSHW 14 Papers at CSHW 14 were extensively discussed, revised by authors, and submitted to IEEE Annals ...
Cambridge CAP computer The Cambridge CAP computer successfully used security capabilities in both hardware and software. Part of a project on memory protection ...
SYSTEMS: ACF ADEPT 50 (stub) B5000 Blacker Cambridge CAP computer C.mmp/Hydra DEC/VAX/SVS (aka VAX VMM Security Kernel or skvax ...
C.mmp/Hydra C.mmp was a Carnegie Mellon University multiprocessor computer system meant to demonstrate the cost/performance advantages of multiprocessor based computers ...
BLACKER BLACKER was the first wide area computer network security project and only the second or third system of any kind to achieve the top "A1" rating of the ...
PROGRAMS: Carnegie Mellon CERT Commercial Cryptographic Endorsement Program (stub) Common Criteria Computer Security Foundations (workshop ...
Completed Project Interviews: 1 Roger Schell (Interviewed 5/1/2012 Posted) 1 Barry Schrager (Interviewed 5/24/2012 Posted) 1 Rebecca Bace (Interviewed ...
Butler Lampson CBI oral history interview with Butler Lampson Butler W. Lampson is a computer scientist and ACM Turing Award winner who, while best known for ...
Access Control Facility (ACF) ACF was a software security system developed at the University of Illinois by Barry Schrager and Eberhard Klemens. Designed to provide ...
Set GROUP Main.tmisa, Main.lewi0740, Main.odlyzko, Main.gf041368, Main.gx062879, Main.gx063087, Main.gx063348, Main.yostx003, Main.jcortada, LanceHoffman Set ...
GO TO MechanismCanary DRAFT VERSION: A canary is a security mechanism designed to prevent buffer overflow attacks. When a buffer overflow attack occurs, it overwrites ...
Trusted Information Systems Trusted Information Systems (TIS) was a computer security research and development company founded by NSA's Steve Walker in 1983. TIS ...
Tom Van Vleck Tom Van Vleck is a computer software engineer and security expert. Enrolling at the Massachusetts Institute of Technology as a freshman in 1961, Van ...
Project Documents NSF CSP CISE Security 2010 Dec.pdf: NSF Computer Security Project proposal. NSF TC Security 2012 08 31 annual report.pdf: First Year Annual ...
Current Activities Project Documents For the project's original NSF proposal and the annual and final project reports see Project Pages Interviews for 2015 ...
Earl Boebert Nov 1966 Feb 1995 (28 years) Senior Research Fellow Honeywell International Apr 1985 Feb 1995 (10 years) Chief Scientist Secure Computing Corporation ...
Hilda Faust (Mathieu) Hilda Faust (Mathieu) worked on computer security as part of the NSA.(1) (double curly brackets) you must choose Force new ...
Canary (buffer overflow) A canary is a security mechanism designed to prevent buffer overflow attacks. When a buffer overflow attack occurs, it overwrites more memory ...
Triple DES is an encryption standard that describes the Triple Data Encryption Algorithm (TDEA, used interchangeably with TDES), which applies the Data Encryption ...
Dr. Roger R. Schell CBI Oral History Interview with Roger Schell (2012) Dr. Roger R. Schell is a retired U.S. Air Force Colonel who is one of the foremost contributors ...
DEC/VAX/VMS VAX/VMS, now known as OpenVMS (Open Virtual Memory System), is a server operating system that runs on VAX, Alpha, and Itanium based computers. Development ...
MITRE MITRE was founded in 1958 as a not for profit corporation to provide engineering and technical services to the federal government. MITRE's customers in the ...
Biba Model The Biba model (or Biba Integrity Model) was first published in 1975, then revised in 1977, approximately one year after the final MITRE publication of ...
Logic Bomb A Logic Bomb (sometimes also called a time bomb) is a type of malicious code that, once installed, will remain inactive in a computer until it happen that ...
IBM Redbooks The IBM Redbooks publications, started in 1968, are produced by IBM's International Technical Support Organization (ITSO), and are intended for IBM IT ...
Background reading on computer security history (see also "References Cited" in original NSF proposal): Ronald E. Doel Thomas Söderqvist, The Historiography ...
To Do List: Done An archive of the active "To Do List" February 2015: done: Clarify overlapping citations to "Orange Book" / TCSEC / "Rainbow Series" that ...
Computer Security Foundations (workshop and symposium) Computer Security Foundations was created in 1988 as a "workshop" of the IEEE Computer Society Technical Committee ...
pls cut out: pls link to Computer Security Foundations (stub) Hi Patrick: put an "exclamation point" in front of McLean to suppress the wiki link . . . I've ...
Whitfield Diffie Whitfield Diffie, who has a B.S. in mathematics from the Massachusetts Institute of Technology, and an honorary doctorate from the Swiss Federal Institute ...
Jerry Saltzer Jerry Saltzer, who has an Sc. D. in electrical engineering from MIT, is a computer scientist most noted for his contributions to the ring network technology ...
Rainbow Series The "Rainbow Series" was a series of computer security standards and guidelines published during the 1980s and the 1990s. The series was originally ...
DoD 5200.28 (TCSEC) TODO: according to John D. McLean oral history, IBM RACF was going for a C2 cert and got C1. Research and confirm, perhaps gather data on ...
Information System Security Association The Information System Security Association (ISSA) is an international, not for profit organization of information security ...
Steve Walker Steve Walker, who has an MSEE from the University of Maryland College Park, and a BSEE from Northeastern University, is noted for his work on the team ...
Leonard LaPadula Leonard LaPadula, a graduate of engineering at Northeastern University, is a programmer and software engineer best known for co authoring the Bell ...
Fernando J. Corbató Fernando J. Corbató, who has a Ph.D. in Physics from the Massachusetts Institute of Technology, is most noted for his pioneering role in the development ...
David Bell David Bell, who has a Ph.D. in mathematics from Vanderbilt University, is co author of the Bell LaPadula security model, which produced conceptual tools ...
Bell LaPadula David Bell and Leonard LaPadula. Secure Computer System: Unified Exposition and Multics Interpretation . Hanscom AFB, Bedford, MA (1976). This was the ...
First Spam The earliest documented instance of spam, meaning junk email, occurred in early May 1978.(2) It was sent ...
GEMSOS The Gemini Multiprocessing Secure Operating System (GEMSOS) was developed at Gemini Computers in conjunction with its Gemini Trusted Network Processor (GTNP ...
SQL Slammer Worm The SQL Slammer worm (also called the Sapphire worm) was notorious for the speed with which it spread after first being released at 5:30 UTC on January ...
SHARE In August 1955 the RAND Corporation sponsored a meeting of 17 organizations, all of whom had ordered an IBM 704 mainframe computer. RAND aimed to provide a ...
MIS Training Institute The MIS Training Institute, based in the USA, UK, and Asia, conducts training in financial and operational auditing, and in information security ...
Common Criteria The Common Criteria is the computer security evaluation scheme that replaced the 1985 Trusted Computer Security Evaluation Criteria (TCSEC), the DoD ...
Commercial Cryptographic Endorsement Program (CCEP)
Security versus . . . . these topics are works in progress and under construction Artful programming Backwards compatibility Compiled (rather ...
IBM AS/400 (iSeries) The Application System/400 (AS/400) was a "mid range" family of IBM computers meant for small and intermediate sized companies.{{ http://www ...
National Computer Security Conference The National Computer Security Conference (NCSC) began in 1977 and ran annually for 23 years. Initially co sponsored by the ...
Who is who? user name Name Email tmisa Tom Misa tmisa #64;umn.edu jcortada Jim Cortada jcortada #64;umn.edu odlyzko Andrew ...
CISSP (Certified Information Systems Security Professional) Certified Information Systems Security Professional (CISSP) is a certification first granted in 1994 by ...
Computer Security FAQ Why may I access some pages and not others? This wiki has 3 levels of access. Many pages, like the project's home page and many other ...
Workshop (home) Workshop Participants Workshop Papers Workshop Photos Workshop publication
Photos at Computer Security History Workshop (July 2014) CSHW 14 Click on for full screen images. Michael Warner Steve Lipner Jeremy Epstein ...
Participants at Computer Security History Workshop (July 2014) CSHW 14 Workshop participants (left to right). Front row: Thomas Misa, Robert Johnston, Karl Grindal ...
B 5000 The B 5000 was the first large scale computer system developed by the Burroughs Corporation, and is considered one of the "third generation" computers. Released ...
Current Activities Who is Who? People Programs Publications CSHW 2014 Systems Events Mechanisms
Daniel Edwards Daniel Edwards is a former administrator of the MIT AI Lab,{{Steven Levy, Hackers: Heroes of the Computer Revolution , Garden City, New York: Anchor ...
Reference Monitor Introduced in James P. Anderson's 1972 Computer Security Planning Study for the United States Air Force, a reference monitor defines a set of ...
Computer Security Initiative Announced in 1977 under the direction of the Under Secretary of Defense for Research and Engineering, the United States Department of ...
Computer Security Institute Founded in 1974, the Computer Security Institute (CSI) is an educational membership organization for information security professionals ...
Computer Security Conference Timeline This timeline is a representation of the emergence of dedicated computer security conferences between 1974 and 1993. Two general ...
Brewer Nash (Chinese Wall) Model David Brewer and Michael Nash first published the "Chinese Wall Security Policy" in 1989, citing the influence of the Clark Wilson ...
Clark Wilson Model In 1987, David D. Clark and David R. Wilson argued that most models of computer security up to that point had focused on data confidentiality, particularly ...
Trojan Horse A Trojan Horse virus (named after the Greek myth) is a malicious program that on the surface appears legitimate but whose hidden purpose is to implant ...
IBM RACF Introduced in 1976, Resource Access Control Facility (RACF) is an IBM software product that provides access control and auditing functionality for mainframe ...
Peter Neumann Holding doctorates in applied mathematics from Harvard and Darmstadt universities, Peter Neumann (pronounced "NOY man") began working with computers ...
Computer Security Journal The Computer Security Journal was created by the Computer Security Institute and first published in 1981. The journal ran between 1981 and ...
This page generates two outlines based on parent child relationships between the wiki entries / topics. If a topic has an oddly chosen "parent" that relationship ...
Number of topics: 100

See also: rss-small RSS feed, recent changes with 50, 100, 200, 500, 1000 topics, all changes

Notes

1 : ande72a.pdf, p. ii: Computer Technology Security Planning Study by James ...

PEOPLE: "Wi" is link to Wikipedia entry (partial list) / "Li" is entry in LinkedIn / "CBI P" is a link to CBI archival papers collection / "OH" is link to existing ...
Secure Communications Processor (SCOMP) Secure Communications Processor (SCOMP) was a system, including hardware and a security kernel, developed by Honeywell Information ...
Ware Report (1970) Ware, Willis. Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security , Rand Report R609 1: Feb ...
MECHANISMS: Advanced Encryption Standard (AES) Asymmetric Key Cryptography Audit Authentication codes Avoidance and deterrence Awareness ...
High Assurance High Assurance in computer security indicates that a computer system adheres to a formal design specification based upon a mathematically proven security ...
Provably Secure Operating System (PSOS) The Provably Secure Operating System (PSOS) began in 1973 as an SRI International project to develop a secure general purpose ...
Computer Security in Popular, Scientific, and Managerial Literatures This page was constructed using the Web of Knowledge database search engine, searching for ...
PUBLICATIONS Featured Computer Security History Workshop (July 2014) ACSAC Classic Papers Computer Security Conference Timeline Matt Bishop Seminal ...
Willis Ware Willis Ware (August 31, 1920 November 22, 2013) was a leader in the field of computer security from the 1960s until his death in 2013. Ware received ...
Matt Bishop Collection of Seminal Papers (http://nob.cs.ucdavis.edu/history/seminal.html) Login Required to View Attachment James P. Anderson: Computer ...
Papers at Computer Security History Workshop (July 2014) CSHW 14 Session 1: Conceptual Foundations — Session Chair: Jeremy Epstein Michael Warner (U.S. Cyber ...
Computer Security History Workshop (July 2014) CSHW 14 On July 11 12, 2014, the Charles Babbage Institute held a workshop for historians and computer security professionals ...
Computer Security History Workshop (July 2014) CSHW 14 Jeffrey Yost, "Computer Security" (Guest editors' introduction) IEEE Annals of the History of Computing ...
EVENTS: 414s (hacker group of 1980s) @Large incidents formation of FBI computer crime squad Attempt to squelch Davida's paper on crypto Avondale ...
Covert Channels: References Butler Lampson, "Protection" paper given in 1970 ACM SIGOPS Operating Systems Review , Volume 8 Issue 1 (Jan 1974): 18 24 DOI ...
Morris Worm The Morris worm was released onto the Internet the evening of November 2, 1988, causing serious damage to the network. The worm was developed and released ...
Buffer Overflow "A buffer overflow is the computing equivalent of trying to pour two liters of water into a one liter pitcher: some water is going to spill out and ...
Carnegie Mellon CERT In 1988, the Morris worm, the first widespread incidence of malware on the Internet to capture the public's attention, pressed several United ...
Eugene Spafford Eugene "Spaf" Spafford is a computer scientist and computer security expert who is the founder and director of the Center for Education and Research ...
Worm A worm is a malicious program that spreads copies of itself through a network. The primary difference between a worm and a standard virus is that, whereas ...
The Cuckoo's Egg The Cuckoo's Egg, a 1989 book by computer scientist Clifford Stoll, details his investigation of a computer hacker who had gained unauthorized access ...
CONTENTS Data Encryption Standard (DES) The Data Encryption Standard (DES) is a 56 bit encryption system that was developed by IBM and adopted by the National Bureau ...
Encryption (New York Times series 1997 2001) Decoder Ring: How a Ragged Band Broke the Government's Hold on Cryptography attach a PDF of each article in separate ...
William Hugh Murray William Hugh Murray is a management consultant, information security professional and former chairperson of the International Information Systems ...
Triple DES (Data Encryption Standard) Triple DES is an encryption standard that describes the Triple Data Encryption Algorithm (TDEA, used interchangeably with TDES ...
Asymmetric Key Cryptography is an umbrella term for any algorithm that uses one secret key for encryption, and a different key for decryption.
To Do List see also To Do List Archive When editing all entries with automatic footnotes{{ like this

2 : Sources disagree whether it was 1 May or 3 May.


Topic revision: r1 - 16 Aug 2001 - 14:58:33 - PeterThoeny?
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback