Browsing by Subject "National Bureau of Standards (NBS)"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item Oral history interview with Lance Hoffman by Rebecca Slayton(Charles Babbage Institute, 2014-07-01) Hoffman, LanceThis interview with security pioneer Lance Hoffman discusses his entrance into the field of computer security and privacy—including earning a B.S. in math at the Carnegie Institute of Technology, interning at SDC, and earning a PhD at Stanford University—before turning to his research on computer security risk management at as a Professor at the University of California–Berkeley and George Washington University. He also discusses the relationship between his PhD research on access control models and the political climate of the late 1960s, and entrepreneurial activities ranging from the creation of a computerized dating service to the starting of a company based upon the development of a decision support tool, RiskCalc. Hoffman also discusses his work with the Association for Computing Machinery and IEEE Computer Society, including his role in helping to institutionalize the ACM Conference on Computers, Freedom, and Privacy. The interview concludes with some reflections on the current state of the field of cybersecurity and the work of his graduate students. This interview is part of a project conducted by Rebecca Slayton and funded by an ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.”Item Oral history interview with Marvin Schaefer(Charles Babbage Institute, 2013-11-20) Schaefer, MarvinThis interview with computer security pioneer Marvin Schaefer discusses his roles and perspectives on computer security work at the System Development Corporation over many years (an organization he began working at in the summer of 1965), as well as his work at the National Computer Security Center in helping to create the Trusted Computer System Evaluation Criteria (TCSEC). With the latter he relates the challenges to writing the criteria, the debates over the structure and levels, and the involvement of criteria lawyers. He also summarizes his work at the company Trusted Information Systems. In addition to detailing his pivotal work in computer security, he offers insightful commentary on issues in the field such as the Bell-LaPadula Model, John McLean’s System Z, and other topics. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Sheila Brand by Rebecca Slayton(Charles Babbage Institute, 2016-09-29) Brand, SheilaThis interview with security pioneer Sheila Brand discusses her early training and career in mathematics and engineering before turning to her work in both private sector and government computer security. In the late 1960s and early 1970s, Brand helped to develop and secure time-shared databases at Commercial Credit Corporation, shortly after Commercial Credit merged with Control Data Corporation (CDC). In the 1970s Brand worked on computer security in the Social Security Administration and the Inspector General’s office of the Department of Health and Human Services before going to the National Security Agency’s new Computer Security Center in 1982. There she authored the Trusted Computer System Evaluation Criteria (TCSEC), or “Orange Book,” which influenced computer security standards around the world. In her later career at the National Security Agency she worked in intelligence as well as continued standards development, for example leading the task force that developed the Unified INFOSEC Criteria. Brand also discusses the processes whereby she overcame multiple obstacles to women pursuing careers in science and engineering, and the process of becoming a manager as well as a problem-solver. This interview is part of a project conducted by Rebecca Slayton and funded by an ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.”Item Oral history interview with Stephen Walker(Charles Babbage Institute, 2012-11-08) Walker, StephenSteve Walker, a computer security pioneer and entrepreneur, began his career at the National Security Agency, before becoming a manager at ARPA’s Information Processing Techniques office in the first half the 1970s. He later served in the Office of the Secretary of Defense as an expert on computer security and organized key early meetings of some of the nation’s foremost computer security experts that were held at the National Bureau of Standards. In the early 1980s Walker’s career took an entrepreneurial turn as he founded Trusted Information Systems. This company became one of the earliest and most important computer security services and software products firms – producing Trusted Xenix and pioneering the firewall area of the computer security software industry. After TIS was sold, Walker worked for a number of years as an IT venture capitalist. Walker discusses his days at NSA, ARPA's IPTO, OSD, and his leadership of Trusted Information Systems in this interview. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”