Computer Security Discourse at RAND, SDC, and NSA (1958-1970)

@article{Misa2016ComputerSD,
  title={Computer Security Discourse at RAND, SDC, and NSA (1958-1970)},
  author={T. Misa},
  journal={IEEE Annals of the History of Computing},
  year={2016},
  volume={38},
  pages={12-25}
}
  • T. Misa
  • Published 2016
  • Engineering, Computer Science
  • IEEE Annals of the History of Computing
The 1967 Spring Joint Computer Conference session organized by Willis Ware and the 1970 Ware Report are widely held by computer security practitioners and historians to have defined the field's origin. This article documents, describes, and assesses new evidence about two early multilevel access, time-sharing systems, SDC's Q-32 and NSA's RYE, and outlines its security-related consequences for both the 1967 SJCC session and 1970 Ware Report. Documentation comes from newly conducted Charles… Expand
Cybersecurity governance: a prehistory and its implications
Purpose The purpose of this paper is to understand the emerging challenges of cybersecurity governance by analyzing the internet’s early history. Design/methodology/approachExpand
Optimization Of Server Computer Security Using The Port Knoking Method On Ubuntu Server 12.04 LTS
TLDR
The severity and number of attacks on the internet and on computer networks have increased rapidly over time, and most security solutions are concentrated on resisting attacks, but cannot eliminate other forms of attack. Expand
Safety at the Workplace – Selected Issues of Personal Data Safety
Abstract The paper presents the problem domain related to data safety management in the face of the threats that organisations of all types encounter in this scope. The Author’s particular concernExpand

References

SHOWING 1-10 OF 91 REFERENCES
Notes on the Evolution of Computer Security Policy in the US Government, 1965-2003
  • Michael Warner
  • Political Science, Computer Science
  • IEEE Annals of the History of Computing
  • 2015
TLDR
White House, congressional, and high-level US Department of Defense policy documents that illustrate the direction and pace of Washington's recognition of potential foreign threats to US government information systems and the government's policy-level response are discussed. Expand
Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military
TLDR
Differences between the cultures of communications security and computer security, the bureaucratic turf war over security, and the emergence and impact of the Department of Defense's Trusted Computer System Evaluation Criteria (the so-called Orange Book) are discussed. Expand
The History of Information Security: A Comprehensive Handbook
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizationsExpand
From Whirlwind to MITRE: The R&D Story of The SAGE Air Defense Computer
This book presents an organizational and social history of one of the foundational projects of the computer era: the development of the SAGE (Semi-Automatic Ground Environment) air defense system,Expand
The Origin and Early History of the Computer Security Software Products Industry
TLDR
In the second half of the 1970s, established computer firms and new IT start-ups chose alternative paths to offer commercial access control systems to organizational mainframe computer users with IBM's RACF and SKK's Access Control Facility 2. Expand
BLACKER: security for the DDN examples of A1 security engineering trades
  • C. Weissman
  • Computer Science
  • Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy
  • 1992
TLDR
There are four devices which together provide a secure system applique to DDN designed to achieve A1 security certification, and the issues reported fall into two groups: A1Security techniques and A1 program management. Expand
Cybersecurity: A Pre-history
Abstract The ‘cyber’ issue is not new, but rather has taken a half-century to develop. Indeed, it was already decades old before the general public and many senior leaders recognized its salience inExpand
Privacy and Protection in Operating Systems
TLDR
A workshop on privacy and protection in operating systems in Princeton, New Jersey, from June 12-14, 1972 was sponsored by the IEEE Committee on Operating Systems. Expand
Security in computing
TLDR
This book describes the security pitfalls inherent in many important computing tasks today and points out where existing controls are inadequate and serious consideration must be given to the risk present in the computing situation. Expand
History of US Government Investments in Cybersecurity Research: A Personal Perspective
  • C. Landwehr
  • Computer Science
  • 2010 IEEE Symposium on Security and Privacy
  • 2010
TLDR
The history of cyber security research funding by the U.S. government from the late 1960s to 2010 is traced and a qualitative, personal perspective on the ups and downs of US cyber securityResearch funding is provided. Expand
...
1
2
3
4
5
...