Computer Security Discourse at RAND, SDC, and NSA (1958-1970)

@article{Misa2016ComputerSD,
  title={Computer Security Discourse at RAND, SDC, and NSA (1958-1970)},
  author={Thomas J. Misa},
  journal={IEEE Annals of the History of Computing},
  year={2016},
  volume={38},
  pages={12-25}
}
  • T. Misa
  • Published 1 October 2016
  • Computer Science
  • IEEE Annals of the History of Computing
The 1967 Spring Joint Computer Conference session organized by Willis Ware and the 1970 Ware Report are widely held by computer security practitioners and historians to have defined the field's origin. This article documents, describes, and assesses new evidence about two early multilevel access, time-sharing systems, SDC's Q-32 and NSA's RYE, and outlines its security-related consequences for both the 1967 SJCC session and 1970 Ware Report. Documentation comes from newly conducted Charles… 

Figures from this paper

Cybersecurity governance: a prehistory and its implications

The purpose of this paper is to understand the emerging challenges of cybersecurity governance by analyzing the internet’s early history by tracing the design and management of early internet and network security technologies in the USA in the 1970s and 1980s.

Optimization Of Server Computer Security Using The Port Knoking Method On Ubuntu Server 12.04 LTS

  • A. -
  • Computer Science
  • 2020
The severity and number of attacks on the internet and on computer networks have increased rapidly over time, and most security solutions are concentrated on resisting attacks, but cannot eliminate other forms of attack.

References

SHOWING 1-10 OF 91 REFERENCES

Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military

Differences between the cultures of communications security and computer security, the bureaucratic turf war over security, and the emergence and impact of the Department of Defense's Trusted Computer System Evaluation Criteria (the so-called Orange Book) are discussed.

The History of Information Security: A Comprehensive Handbook

This book is intended as a first comprehensive work in Information Security and consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.

From Whirlwind to MITRE: The R&D Story of The SAGE Air Defense Computer

This book presents an organizational and social history of one of the foundational projects of the computer era: the development of the SAGE (Semi-Automatic Ground Environment) air defense system,

The Origin and Early History of the Computer Security Software Products Industry

In the second half of the 1970s, established computer firms and new IT start-ups chose alternative paths to offer commercial access control systems to organizational mainframe computer users with IBM's RACF and SKK's Access Control Facility 2.

BLACKER: security for the DDN examples of A1 security engineering trades

  • C. Weissman
  • Computer Science
    Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy
  • 1992
There are four devices which together provide a secure system applique to DDN designed to achieve A1 security certification, and the issues reported fall into two groups: A1Security techniques and A1 program management.

Cybersecurity: A Pre-history

Abstract The ‘cyber’ issue is not new, but rather has taken a half-century to develop. Indeed, it was already decades old before the general public and many senior leaders recognized its salience in

Privacy and Protection in Operating Systems

A workshop on privacy and protection in operating systems in Princeton, New Jersey, from June 12-14, 1972 was sponsored by the IEEE Committee on Operating Systems.

Security in computing

History of US Government Investments in Cybersecurity Research: A Personal Perspective

  • C. Landwehr
  • Political Science, Computer Science
    2010 IEEE Symposium on Security and Privacy
  • 2010
The history of cyber security research funding by the U.S. government from the late 1960s to 2010 is traced and a qualitative, personal perspective on the ups and downs of US cyber securityResearch funding is provided.

Messaging in the Early SDC Time-Sharing System

In the early 1960s, the time-sharing computer at the System Development Corporation had several messaging commands through which remotely logged in users communicated with one another and with the
...