The Origin and Early History of the Computer Security Software Products Industry

@article{Yost2015TheOA,
  title={The Origin and Early History of the Computer Security Software Products Industry},
  author={Jeffrey R. Yost},
  journal={IEEE Annals of the History of Computing},
  year={2015},
  volume={37},
  pages={46-58}
}
  • Jeffrey R. Yost
  • Published 2 June 2015
  • Computer Science
  • IEEE Annals of the History of Computing
In the second half of the 1970s, established computer firms and new IT start-ups chose alternative paths to offer commercial access control systems to organizational mainframe computer users. These developments in effect launched the computer security software products industry with IBM's Resource Access Control Facility (RACF) and SKK's Access Control Facility 2 (ACF2). 

Before It Was a Giant: The Early History of Symantec, 1982-1999

This story tells not only about nimbleness in the early software industry, but also about the importance of venture capitalists in the success and failure of early software firms.

Computer Security Discourse at RAND, SDC, and NSA (1958-1970)

  • T. Misa
  • Computer Science
    IEEE Annals of the History of Computing
  • 2016
New evidence about two early multilevel access, time-sharing systems, SDC's Q-32 and NSA's RYE, and its security-related consequences for both the 1967 SJCC session and 1970 Ware Report are described.

Before It Was a Giant: The Early History of Symantec, 1982–1999

This story explores both the nimbleness in the early software industry and the importance of venture capitalists in the success and failure of early software firms.

Development of Secure Software : Rationale, Standards and Practices

Software security engineering manages the software risk by implementing various security controls right into the software, and by providing security assurance for the existence of these controls by verification and validation.

Fitting Security into Agile Software Development

To identify the incompatibilities between the approaches, the security engineering activities from Microsoft SDL, the ISO Common Criteria and OWASP SAMM security engineering models are mapped into common agile software development processes, practices and artifacts.

Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity

This study of the PLI is an entry into the historical relationship between cryptography and packet-switched computer networks.

Design Dimensions for Software Certification: A Grounded Analysis

This study compares two certification standards, Common Criteria and DO-178C, and collects insights from literature and from interviews with subject-matter experts to identify design options relevant to the design of standards, serving as a framework to guide the comparison, creation, and revision of certification standards and processes.

Aligning security objectives with agile software development

Security engineering activities from Microsoft SDL, the ISO Common Criteria and OWASP SAMM security development lifecycle models are mapped into common agile processes, practises and artifacts to identify the incompatibilities between the methodologies.

Cryptography as information control

  • S. West
  • Computer Science, Mathematics
    Social studies of science
  • 2022
Drawing on archival materials, the article considers how public key cryptography was the product of an emerging consensus among cryptographers of the importance of privacy in the wake of abuses of surveillance powers by government agencies.

Historical Consciousness of Cyber Security in India

  • R. Subramanian
  • Computer Science, Political Science
    IEEE Annals of the History of Computing
  • 2020
A comprehensive analysis of India's cyber security history and security consciousness shows that postindependent India granted its citizens freedom of expression and the freedom to elect and govern, but did not do away with the colonial vestiges of internally-focused control policies using ICTs.

References

SHOWING 1-10 OF 50 REFERENCES

Security and privacy in computer systems

  • W. Ware
  • Computer Science
    AFIPS '67 (Spring)
  • 1967
This session is concerned with accidents or deliberate attempts which divulge computer-resident information to unauthorized parties.

The Computer Industry

This book discusses the rise of software as a Service, product, business, and industry, 1958-1975, and the Computer Networking Revolution and the computer industry, 1990-2004.

Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security

This paper argues that resource-sharing systems, where the problems of security are admittedly most acute at present, must be designed to protect each user form interference by another user or by the system itself, and must provide some sort of 'privacy' protection to users who wish to preserve the integrity of their data and their programs.

From airline reservations to sonic the hedgehog: a history of the software industry - Book Review

The story of lucrative software products such as IBM's CICS and SAP's R/3, which, though little known to the general public, lie at the heart of today's information infrastructure.

The multics system: an examination of its structure

The author builds a picture of the life of a process in coexistence with other processes, and suggests ways to model or construct subsystems that are far more complex than could be implemented using predecessor computer facilities.

Security considerations in a multi-programmed computer system

  • B. Peters
  • Computer Science
    AFIPS '67 (Spring)
  • 1967
There are several minimum requirements to establish an adequate security level for the software of a large multi-programmed system with remote terminals.

Thirty years later: lessons from the Multics security evaluation

  • P. KargerR. Schell
  • Computer Science
    18th Annual Computer Security Applications Conference, 2002. Proceedings.
  • 2002
The lessons learned from the vulnerability assessment of Multics are highly applicable today as governments and industry strive to "secure" today's weaker operating systems through add-ons, "hardening", and intrusion detection schemes.

Voluntarism and the Fruits of Collaboration: The IBM User Group, Share

Ce groupe fonde par des utilisateurs de l'ordinateur central IBM 704 et ensuite 709, se developpa en reponse a un manque de donnees techniques dans une industrie relativement recente, mais aussi une

Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

Crypto tells the inside story of how a group of "crypto rebels" teamed up with corporate interests to beat Big Brother and ensure the authors' privacy on the Internet.