Browsing by Subject "Intrusion Detection Expert System (IDES)"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item Oral history interview with Dorothy E. Denning(Charles Babbage Institute, 2013-04-11) Denning, Dorothy E.Computer security pioneer Dorothy Denning discusses her career including her Lattice Model for Computer Security, research on database security, intrusion detection, and other areas, such as her influential textbooks. The interview also addresses computer security research infrastructure and collaborators at various institutions where she worked including Purdue University, SRI International, Digital Equipment Corporation, Georgetown University, and Naval Postgraduate School. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Karl Levitt(Charles Babbage Institute, 2013-06-06) Levitt, KarlComputer security pioneer discusses his educational background and early career, with the bulk of the interview on his approximately four decades plus focus on computer security research. He discusses his work with fault-tolerant systems, the institutional setting and his research and management roles at SRI (including PSOS, IDES/NIDES, etc.). He also discusses joining the faculty at UC-Davis in Computer Science and launching its Computer Security Laboratory, which has been influential in educating and placing computer security specialists in academe, government, and industry. Also discussed is his post-IDES/NIDES work on intrusion detection, voting systems and security, federal funding for computer security, his program manager role for Trustworthy Computing at NSF, and other topics. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Peter G. Neumann(Charles Babbage Institute, 2013-06-03) Neumann, Peter G.In this interview, computer security pioneer Peter G. Neumann relates his education at Harvard University (A.B. in Math, S.M. and Ph.D. in Applied Math), including an influential (to his perspective and career) two-hour long meeting/discussion as an undergraduate with Albert Einstein (discussing “complexity” and other topics). The vast majority of the interview addresses the many facets of his highly influential career in computer security research. With regard to the latter, this includes discussion of his work at Bell Labs and extensive involvement with MULTICS security, and his subsequent four-decade (and continuing) career as a research scientist at SRI International. He tells of his work and leadership with the Provably Secure Operating System (PSOS), research and writing on risks (including moderating the ACM Risks Forum), insider misuse and intrusion-detection systems (IDES, NIDES, EMERALD), and his current work on two DARPA-funded projects that builds on key lessons of the past to design and develop secure/trustworthy computer systems. He also relates the computer security research infrastructure and how it evolved, as well as comments on a number of other topics such as the major computer security conferences and the range of perspectives of researchers in the computer security research community. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Teresa F. Lunt(Charles Babbage Institute, 2013-06-04) Lunt, Teresa F.This interview with computer security pioneer Teresa Lunt discusses her work in the computer security field at MITRE Corporation, SRI International, DARPA, and PARC. At SRI she was a principal research scientist on IDES, the first meaningful intrusion detection expert system. Lunt also discusses her work at SRI pioneering a highly secure database system (research initially launched by Dorothy Denning), as well as her work at DARPA’s Information Technology Office where she started programs to fund research in computer and network security. The interview concludes with her discussion of security work at PARC, where she is the Director of the Computer Science Laboratory. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”