Oral history interview with William H. Murray

Loading...
Thumbnail Image

Persistent link to this item

Statistics
View Statistics

Journal Title

Journal ISSN

Volume Title

Title

Oral history interview with William H. Murray

Published Date

2013-09-24

Publisher

Charles Babbage Institute

Type

Oral History

Abstract

In this interview computer security pioneer William Murray begins by discussing early work experiences and influences (his father was an IBM CE and manager, and his mother was a keypunch operator). The bulk of the interview focuses on his work at IBM in computer security and his reflections on developments in this field. This includes efforts with computer security at IBM SHARE, Bob Courtney as an early leader at IBM in this field, Horst Feistel and the cryptographic research group at IBM, MVS TSO, IBM’s MVS Integrity Commitment, TCSEC, and RACF. He also provides context to a number of his publications including his influential Access Control Facility for AAS and Data Security and Controls. Murray was an influential figure with ISC-squared and the CISSP security credential and the auditing and forensics sides to security (working as a consultant for Deloitte & Touche and Ernst & Young after leaving IBM). This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Description

Transcript, 100 pp.

Related to

Replaces

License

Series/Report Number

Funding information

National Science Foundation Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Isbn identifier

Doi identifier

Previously Published Citation

William H. Murray, OH 433. Oral history interview by Jeffrey R. Yost, 24 September 2013, New Canaan, CT. Charles Babbage Institute, University of Minnesota, Minneapolis. http://hdl.handle.net/11299/163163

Other identifiers

OH 433

Suggested citation

Murray, William H.. (2013). Oral history interview with William H. Murray. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/163163.

Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.