Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
7729 Dec 2015 - 18:18ThomasMisa 
7629 Dec 2015 - 15:52ThomasMisa 
7521 Dec 2015 - 13:23ThomasMisa 
7421 Dec 2015 - 13:18ThomasMisa 
7320 Oct 2015 - 09:04ThomasMisa 
7207 Oct 2015 - 14:46ThomasMisa 
7109 Sep 2015 - 12:03ThomasMisa 
7003 Aug 2015 - 17:31ThomasMisa 
6923 Jun 2015 - 12:38ThomasMisa 
6805 Jun 2015 - 17:42ThomasMisa 
earlier first

Render style:     Context:


 History: r77 < r76 < r75 < r74 < r73
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>WebHome (29 Dec 2015, ThomasMisa)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

This is a working site for the Charles Babbage Institute's NSF-funded project on the history of computer security. You can comment on and contribute to these pages once you register as an external user.
UPDATED Special issue of IEEE Annals of the History of Computing volume 37 no. 2 (April-June 2015) on computer security is published
NEW security dimensions of Canary (buffer overflow) . . . . Data Encryption Standard (DES) . . . . Triple-DES . . . . Publication of CSHW papers in IEEE Annals of the History of Computing Spring 2015 . . . . Butler Lampson (including oral history) . . . . Morris Worm
thumbs-up popular this month (Aug. 2015 topic views = 24,572, Sept = 20,552, Oct = 17,327) . . . . "Rainbow Series" of Publications . . . . Publication of Computer Security History Workshop (July 2014). . . . Multics . . . . Data Encryption Standard (DES) . . . . Brewer-Nash (Chinese Wall) Model . . . . Morris Worm . . . .

While computer security receives much attention in the media, and has become a key focus of computer science, national security, and computer use in general, little is known of its origins as a research field and professional practice. The few existing historical outlines leave many questions about the development of computer security standards and methods -- both as a technical exercise, and as social, political, scientific, and economic endeavors.

The Charles Babbage Institute with the support of NSF's Trustworthy Computing program has completed a research project (2011-15) to investigate and document the origins and development of computer security. One component of this project is a series of 31 research-grade oral histories with computer security pioneers, including individuals from government, military, and industry (see below). The second component is this wiki site where historians and computer-security professionals engage in knowledge networking to create a specialized reference source. The third component is an archival collection development effort to preserve and provide permanent public access to materials of high research value, including reports, personal papers, and organizational records. Together, these resources are building a better understanding of a field where past lessons are becoming more important to computer security. CBI is also publishing original scholarship to help better understand the field and to attract attention to the research materials the project collects.

Completed Project Interviews:

  1. Roger Schell (Interviewed 5/1/2012 | Posted)
  2. Barry Schrager (Interviewed 5/24/2012 | Posted)
  3. Rebecca Bace (Interviewed 7/31/12 | Posted)
  4. Steve Lipner (Interviewed 8/15/12 | Posted)
  5. David Bell (Interviewed 9/24/12 | Posted)
  6. Tom Van Vleck (Interviewed 10/24/12 | Posted)
  7. Steve Walker (Interviewed 11/8/2012 | Posted)
  8. Eldon Worley (Interviewed 11/15/2012 | Posted)
  9. Peter Denning (Interviewed 4/10/2013 | Posted)
  10. Dorothy Denning (Interviewed 4/11/2013 | Posted)
  11. Peter Neumann (Interviewed 6/3/2013 | Posted)
  12. Teresa F. Lunt (Interviewed 6/4/2013 | Posted)
  13. Susan H. Nycum (Interviewed 6/5/2013 | Posted)
  14. Matthew Bishop (Interviewed 6/6/2013 | Posted)
  15. Karl Levitt (Interviewed 6/6/2013 | Posted)
  16. Daniel Edwards (Interviewed 7/2/2013 | Posted)
  17. Seymour Goodman (Interviewed 8/6/2013 | Posted)
  18. William Hugh Murray (Interviewed 9/24/2013 | Posted)
  19. Robert E. "Bob" Johnston (Interviewed 10/28/2013 | Posted)
  20. Eugene "Spaf" Spafford (Interviewed 11/12/2013 | Posted)
  21. Marvin Schaefer (Interviewed 11/20/2013 | Posted)
  22. Carl E. Landwehr (Interviewed 4/21/2014 | Posted)
  23. John D. McLean (Interviewed 4/22/2014 | Posted)
  24. Richard Kemmerer (Interviewed 4/30/2014 | Posted)
  25. Terry Benzel (interviewed 11/18/2014 | Posted)
  26. Butler Lampson (interviewed 12/11/2014 | Posted)
  27. Earl Boebert (interviewed 28 April 2015 | Posted)
  28. Ross Anderson (interviewed 21 May 2015 | Posted)
  29. Richard Y. Kain (interviewed 27 May 2015 | Posted)
  30. William Wulf (interviewed 23 June 2015 | in transcription)
  31. Anita Jones (interviewed 24 June 2015 | in transcription)

-- ThomasMisa - 16 Dec 2015

Other Computer Security Interviews:

Existing (security-related) CBI Interviews:

Site Topics:

Password-Protected Site Topics:

These topics are not "public access"; to access content you will need to log in with a registered user-name and password. Please see the SiteFAQ for instructions or contact Tom Misa.

 

Supported by the National Science Foundation CNS--TC 1116862 "Building an Infrastructure for Computer Security History."

Topic revision: r77 - 29 Dec 2015 - 18:18:04 - ThomasMisa
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback