The Origin and Early History of the Computer Security Software Products Industry

@article{Yost2015TheOA,
  title={The Origin and Early History of the Computer Security Software Products Industry},
  author={Jeffrey R. Yost},
  journal={IEEE Annals of the History of Computing},
  year={2015},
  volume={37},
  pages={46-58}
}
  • Jeffrey R. Yost
  • Published 2015
  • Computer Science
  • IEEE Annals of the History of Computing
In the second half of the 1970s, established computer firms and new IT start-ups chose alternative paths to offer commercial access control systems to organizational mainframe computer users. These developments in effect launched the computer security software products industry with IBM's Resource Access Control Facility (RACF) and SKK's Access Control Facility 2 (ACF2). 
Before It Was a Giant: The Early History of Symantec, 1982-1999
TLDR
This story tells not only about nimbleness in the early software industry, but also about the importance of venture capitalists in the success and failure of early software firms. Expand
Computer Security Discourse at RAND, SDC, and NSA (1958-1970)
  • T. Misa
  • Engineering, Computer Science
  • IEEE Annals of the History of Computing
  • 2016
TLDR
New evidence about two early multilevel access, time-sharing systems, SDC's Q-32 and NSA's RYE, and its security-related consequences for both the 1967 SJCC session and 1970 Ware Report are described. Expand
Before It Was a Giant: The Early History of Symantec, 1982–1999
Abstract: Before Symantec became a major supplier of security software, it offered a variety of natural-language microcomputer software products. Its growth into a security firm was the result of itsExpand
Development of Secure Software : Rationale, Standards and Practices
TLDR
Software security engineering manages the software risk by implementing various security controls right into the software, and by providing security assurance for the existence of these controls by verification and validation. Expand
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
The Private Line Interface was a cryptographic cybersecurity device used on the Arpanet, operating at the edge of the network with little modification of the network infrastructure. As a result ofExpand
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
TLDR
This study of the PLI is an entry into the historical relationship between cryptography and packet-switched computer networks. Expand
Fitting Security into Agile Software Development
TLDR
To identify the incompatibilities between the approaches, the security engineering activities from Microsoft SDL, the ISO Common Criteria and OWASP SAMM security engineering models are mapped into common agile software development processes, practices and artifacts. Expand
Design Dimensions for Software Certification: A Grounded Analysis
TLDR
This study compares two certification standards, Common Criteria and DO-178C, and collects insights from literature and from interviews with subject-matter experts to identify design options relevant to the design of standards, serving as a framework to guide the comparison, creation, and revision of certification standards and processes. Expand
Aligning security objectives with agile software development
TLDR
Security engineering activities from Microsoft SDL, the ISO Common Criteria and OWASP SAMM security development lifecycle models are mapped into common agile processes, practises and artifacts to identify the incompatibilities between the methodologies. Expand
Historical Consciousness of Cyber Security in India
  • R. Subramanian
  • Computer Science, Engineering
  • IEEE Annals of the History of Computing
  • 2020
TLDR
A comprehensive analysis of India's cyber security history and security consciousness shows that postindependent India granted its citizens freedom of expression and the freedom to elect and govern, but did not do away with the colonial vestiges of internally-focused control policies using ICTs. Expand
...
1
2
...

References

SHOWING 1-10 OF 35 REFERENCES
A history of computer security standards
Publisher Summary This chapter discusses the history of computer security standards. Computer security has been a fundamental aspect of digital computing for decades, with both getting their startExpand
Security and privacy in computer systems
  • W. Ware
  • Computer Science
  • AFIPS '67 (Spring)
  • 1967
TLDR
This session is concerned with accidents or deliberate attempts which divulge computer-resident information to unauthorized parties. Expand
The Computer Industry
Acknowledgements Introduction The Prehistory of the Computer Industry, 1880-1939 The Advent of the Mainframe Digital Computer, 1940-1957 Broadening Scale and Scope of the Mainframe Computer Industry,Expand
Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security
Abstract : The wide use of computers in military and defense installations has long necessitated the application of security rules and regulations. A basic principle underlying the security ofExpand
From airline reservations to sonic the hedgehog: a history of the software industry - Book Review
TLDR
The story of lucrative software products such as IBM's CICS and SAP's R/3, which, though little known to the general public, lie at the heart of today's information infrastructure. Expand
The multics system: an examination of its structure
TLDR
The author builds a picture of the life of a process in coexistence with other processes, and suggests ways to model or construct subsystems that are far more complex than could be implemented using predecessor computer facilities. Expand
Security considerations in a multi-programmed computer system
TLDR
There are several minimum requirements to establish an adequate security level for the software of a large multi-programmed system with remote terminals. Expand
Thirty years later: lessons from the Multics security evaluation
  • P. Karger, R. Schell
  • Engineering, Computer Science
  • 18th Annual Computer Security Applications Conference, 2002. Proceedings.
  • 2002
TLDR
The lessons learned from the vulnerability assessment of Multics are highly applicable today as governments and industry strive to "secure" today's weaker operating systems through add-ons, "hardening", and intrusion detection schemes. Expand
Voluntarism and the Fruits of Collaboration: The IBM User Group, Share
Ce groupe fonde par des utilisateurs de l'ordinateur central IBM 704 et ensuite 709, se developpa en reponse a un manque de donnees techniques dans une industrie relativement recente, mais aussi uneExpand
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age
From the Publisher: If gou've ever made a secure purchase with your credit card online, you have seen cryptography, or "crypto," in action. From Steven Levy -- the author who made "hackers" aExpand
...
1
2
3
4
...