Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
108 Aug 2001 - 00:20PeterThoeny 

Render style:     Context:


 History: r1
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>WebChanges (16 Aug 2001, PeterThoeny?)

50 Recent Changes in CBI_ComputerSecurity Web retrieved at 12:21 (Local)

Statistics for nop CBI ComputerSecurity Web Month: Topic views: Topic saves: File uploads: Most popular topic views: Top contributors for ...
This is a working site for the Charles Babbage Institute's NSF funded project on the history of computer security. You can comment on and contribute to these pages ...
Publication of Computer Security History Workshop (July 2014) CSHW 14 Papers at CSHW 14 were extensively discussed, revised by authors, and submitted to IEEE Annals ...
Cambridge CAP computer The Cambridge CAP computer successfully used security capabilities in both hardware and software. Part of a project on memory protection ...
SYSTEMS: ACF ADEPT 50 (stub) B5000 Blacker Cambridge CAP computer C.mmp/Hydra DEC/VAX/SVS (aka VAX VMM Security Kernel or skvax ...
C.mmp/Hydra C.mmp was a Carnegie Mellon University multiprocessor computer system meant to demonstrate the cost/performance advantages of multiprocessor based computers ...
BLACKER BLACKER was the first wide area computer network security project and only the second or third system of any kind to achieve the top "A1" rating of the ...
PROGRAMS: Carnegie Mellon CERT Commercial Cryptographic Endorsement Program (stub) Common Criteria Computer Security Foundations (workshop ...
Completed Project Interviews: 1 Roger Schell (Interviewed 5/1/2012 Posted) 1 Barry Schrager (Interviewed 5/24/2012 Posted) 1 Rebecca Bace (Interviewed ...
Butler Lampson CBI oral history interview with Butler Lampson Butler W. Lampson is a computer scientist and ACM Turing Award winner who, while best known for ...
Access Control Facility (ACF) ACF was a software security system developed at the University of Illinois by Barry Schrager and Eberhard Klemens. Designed to provide ...
Set GROUP Main.tmisa, Main.lewi0740, Main.odlyzko, Main.gf041368, Main.gx062879, Main.gx063087, Main.gx063348, Main.yostx003, Main.jcortada, LanceHoffman Set ...
GO TO MechanismCanary DRAFT VERSION: A canary is a security mechanism designed to prevent buffer overflow attacks. When a buffer overflow attack occurs, it overwrites ...
Trusted Information Systems Trusted Information Systems (TIS) was a computer security research and development company founded by NSA's Steve Walker in 1983. TIS ...
Tom Van Vleck Tom Van Vleck is a computer software engineer and security expert. Enrolling at the Massachusetts Institute of Technology as a freshman in 1961, Van ...
Project Documents NSF CSP CISE Security 2010 Dec.pdf: NSF Computer Security Project proposal. NSF TC Security 2012 08 31 annual report.pdf: First Year Annual ...
Current Activities Project Documents For the project's original NSF proposal and the annual and final project reports see Project Pages Interviews for 2015 ...
Earl Boebert Nov 1966 Feb 1995 (28 years) Senior Research Fellow Honeywell International Apr 1985 Feb 1995 (10 years) Chief Scientist Secure Computing Corporation ...
Hilda Faust (Mathieu) Hilda Faust (Mathieu) worked on computer security as part of the NSA.(1) (double curly brackets) you must choose Force new ...
Canary (buffer overflow) A canary is a security mechanism designed to prevent buffer overflow attacks. When a buffer overflow attack occurs, it overwrites more memory ...
Triple DES is an encryption standard that describes the Triple Data Encryption Algorithm (TDEA, used interchangeably with TDES), which applies the Data Encryption ...
Number of topics: 50

See also: rss-small RSS feed, recent changes with 50, 100, 200, 500, 1000 topics, all changes

Notes

1 : ande72a.pdf, p. ii: Computer Technology Security Planning Study by James ...

PEOPLE: "Wi" is link to Wikipedia entry (partial list) / "Li" is entry in LinkedIn / "CBI P" is a link to CBI archival papers collection / "OH" is link to existing ...
Secure Communications Processor (SCOMP) Secure Communications Processor (SCOMP) was a system, including hardware and a security kernel, developed by Honeywell Information ...
Ware Report (1970) Ware, Willis. Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security , Rand Report R609 1: Feb ...
MECHANISMS: Advanced Encryption Standard (AES) Asymmetric Key Cryptography Audit Authentication codes Avoidance and deterrence Awareness ...
High Assurance High Assurance in computer security indicates that a computer system adheres to a formal design specification based upon a mathematically proven security ...
Provably Secure Operating System (PSOS) The Provably Secure Operating System (PSOS) began in 1973 as an SRI International project to develop a secure general purpose ...
Computer Security in Popular, Scientific, and Managerial Literatures This page was constructed using the Web of Knowledge database search engine, searching for ...
PUBLICATIONS Featured Computer Security History Workshop (July 2014) ACSAC Classic Papers Computer Security Conference Timeline Matt Bishop Seminal ...
Willis Ware Willis Ware (August 31, 1920 November 22, 2013) was a leader in the field of computer security from the 1960s until his death in 2013. Ware received ...
Matt Bishop Collection of Seminal Papers (http://nob.cs.ucdavis.edu/history/seminal.html) Login Required to View Attachment James P. Anderson: Computer ...
Papers at Computer Security History Workshop (July 2014) CSHW 14 Session 1: Conceptual Foundations ¬ó Session Chair: Jeremy Epstein Michael Warner (U.S. Cyber ...
Computer Security History Workshop (July 2014) CSHW 14 On July 11 12, 2014, the Charles Babbage Institute held a workshop for historians and computer security professionals ...
Computer Security History Workshop (July 2014) CSHW 14 Jeffrey Yost, "Computer Security" (Guest editors' introduction) IEEE Annals of the History of Computing ...
EVENTS: 414s (hacker group of 1980s) @Large incidents formation of FBI computer crime squad Attempt to squelch Davida's paper on crypto Avondale ...
Covert Channels: References Butler Lampson, "Protection" paper given in 1970 ACM SIGOPS Operating Systems Review , Volume 8 Issue 1 (Jan 1974): 18 24 DOI ...
Morris Worm The Morris worm was released onto the Internet the evening of November 2, 1988, causing serious damage to the network. The worm was developed and released ...
Buffer Overflow "A buffer overflow is the computing equivalent of trying to pour two liters of water into a one liter pitcher: some water is going to spill out and ...
Carnegie Mellon CERT In 1988, the Morris worm, the first widespread incidence of malware on the Internet to capture the public's attention, pressed several United ...
Eugene Spafford Eugene "Spaf" Spafford is a computer scientist and computer security expert who is the founder and director of the Center for Education and Research ...
Worm A worm is a malicious program that spreads copies of itself through a network. The primary difference between a worm and a standard virus is that, whereas ...
The Cuckoo's Egg The Cuckoo's Egg, a 1989 book by computer scientist Clifford Stoll, details his investigation of a computer hacker who had gained unauthorized access ...
CONTENTS Data Encryption Standard (DES) The Data Encryption Standard (DES) is a 56 bit encryption system that was developed by IBM and adopted by the National Bureau ...
Encryption (New York Times series 1997 2001) Decoder Ring: How a Ragged Band Broke the Government's Hold on Cryptography attach a PDF of each article in separate ...
William Hugh Murray William Hugh Murray is a management consultant, information security professional and former chairperson of the International Information Systems ...
Triple DES (Data Encryption Standard) Triple DES is an encryption standard that describes the Triple Data Encryption Algorithm (TDEA, used interchangeably with TDES ...
Asymmetric Key Cryptography is an umbrella term for any algorithm that uses one secret key for encryption, and a different key for decryption.
To Do List see also To Do List Archive When editing all entries with automatic footnotes{{ like this


Topic revision: r1 - 16 Aug 2001 - 14:58:33 - PeterThoeny?
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback