Browsing by Subject "MITRE Corporation"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
Item Oral history interview with David Elliott Bell(Charles Babbage Institute, 2012-09-24) Bell, David ElliottDavid Elliott Bell is a mathematician and computer security pioneer who co-developed the highly influential Bell-LaPadula security model. This interview discusses the context of his pivotal computer security work at MITRE Corporation, and his later contributions at the National Security Agency and Trusted Information Systems (including his leadership on TIS’s Trusted Xenix B2-rated system). This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Robert Everett(2005) Everett, RobertThis interview with Robert Everett (1921-2018) begins with a discussion of his experiences pursuing BS (Duke University, 1942) and MS (MIT, 1943) degrees in electrical engineering. It then explores his participation in the Whirlwind and SAGE projects, with an emphasis on hardware engineering aspects and the role of engineers and engineering in the early computer projects. Everett also shares his views on early trends in computer design and development, the boundaries between hardware and software, and his movement into leadership at MITRE Corporation.Item Oral history interview with Steven B. Lipner(Charles Babbage Institute, 2012-08-15) Lipner, Steven B.Steven B. Lipner is a computer security pioneer with more than 40 years of experience as a researcher, development manager, and general manager in IT Security. He helped form and served on the Anderson Panel for the Air Force in the early 1970s (was MITRE’s representative), oversaw path breaking computer security high assurance mathematical model work at MITRE later that decade, was a leader in Digital Equipment Corporation’s (DEC) effort to build an A1 (TCSEC certification) system in the 1980s, and led the creation of Microsoft’s Security Development Lifecycle in the 2000s. This interview focuses primarily on Lipner’s involvement on the Anderson Panel, his work at MITRE, and his work at DEC. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Teresa F. Lunt(Charles Babbage Institute, 2013-06-04) Lunt, Teresa F.This interview with computer security pioneer Teresa Lunt discusses her work in the computer security field at MITRE Corporation, SRI International, DARPA, and PARC. At SRI she was a principal research scientist on IDES, the first meaningful intrusion detection expert system. Lunt also discusses her work at SRI pioneering a highly secure database system (research initially launched by Dorothy Denning), as well as her work at DARPA’s Information Technology Office where she started programs to fund research in computer and network security. The interview concludes with her discussion of security work at PARC, where she is the Director of the Computer Science Laboratory. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Terry Benzel(Charles Babbage Institute, 2014-11-18) Benzel, TerryComputer security pioneer Terry Benzel discusses her education and programming work at Charles Draper Laboratory, before focusing on her work at MITRE Corporation, Trusted Information Systems (TIS), Network Associates and USC Information Sciences Institute (ISI). The MITRE discussion highlights her early role and perspectives on criteria evaluation (including her role in the SCOMP evaluation) in the formative years of TCSEC and after the publication of the criteria in 1983. Starting as a TIS principal scientist she rose to become a vice president in charge of the West Coast (Los Angeles) office, and later led a research team of 120 scientists/engineers for Network Associates. Among the technologies discussed are firewall development, and the security testbed at ISI. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Thomas A. Berson by Rebecca Slayton(Charles Babbage Institute, 2014-04-18) Berson, Thomas A.This interview with computer security pioneer Tom Berson discusses his early interest in computers, formal training in physics and computer science, and career in computer and network security industry. Berson earned a bachelor’s degree in physics before going to IBM Yorktown Heights in the late 1960s. He worked as a consultant while earning a Ph.D. in computer science from University College London, which he completed in 1977. After completing the Ph.D. he went to work for Ford Aerospace and Communications Corporation in California, where he worked on the Kernelized Secure Operating System (KSOS). In 1979 he and five others from Ford started a computer networking company, Sytek, where Berson was involved in several innovations related to network security. In 1986 he founded a new start-up, Anagram. Berson also discusses his involvement in IEEE Symposium on Security and Privacy, the International Association for Cryptologic Research (IACR), the influence of the Orange Book, and the future of the field of computer security. This interview is part of a project conducted by Rebecca Slayton and funded by an ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.”