Browsing by Subject "Purdue University"
Now showing 1 - 6 of 6
- Results Per Page
- Sort Options
Item Oral history interview with Dorothy E. Denning(Charles Babbage Institute, 2013-04-11) Denning, Dorothy E.Computer security pioneer Dorothy Denning discusses her career including her Lattice Model for Computer Security, research on database security, intrusion detection, and other areas, such as her influential textbooks. The interview also addresses computer security research infrastructure and collaborators at various institutions where she worked including Purdue University, SRI International, Digital Equipment Corporation, Georgetown University, and Naval Postgraduate School. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Eugene H. Spafford(Charles Babbage Institute, 2013-11-12) Spafford, Eugene H.This interview with computer security pioneer Eugene Spafford spans from his early education to the near present (2013). He discusses how he came to focus on computer security as a research field and his long and ongoing career as a faculty member, editor-in-chief (Computers & Security), center director, and educator. A substantial portion of the interview addresses his work in founding and leading a premier center for computer security research—COAST Lab (Computer Operations, Audit, and Security Technology), which evolved to become CERIAS (Center for Education and Research in Information Assurance and Security). CERIAS is the largest academic research center on information assurance and computer security and has had tremendous influence on the field from its pioneer research and education to its highly regarded symposiums and outreach. Among other topics Spafford discusses are intrusion detection research and development, Unix security, Tripwire, the Association for Computing Machinery, service to the federal government, and the importance of a sense of humor. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Helen Ann Bauer(Charles Babbage Institute, 2015-12-08) Bauer, Helen AnnHelen Bauer studied computer science and mathematics at Purdue University, graduating in 1972 and then starting work as a Member of Technical Staff at Bell Laboratories in Naperville, Illinois. The interview describes Bell’s affirmative action committees and workshops and its corporate culture. Bauer relates her experiences moving into managerial positions beginning in 1977, finding role models in co-workers, organizing support groups for women in management, and relating anecdotes about challenges. This material is based on work funded by the Alfred P. Sloan Foundation award B2014-07 “Tripling Women’s Participation in Computing (1965-1985).”Item Oral history interview with Mary Shutt(Charles Babbage Institute, 2015-11-06) Shutt, MaryMary Shutt graduated from Purdue University in 1980 with a degree in industrial engineering, finding it a supportive educational environment. After interviewing with a number of companies, she landed a job offer with Sperry Univac in the Twin Cities. Her first responsibilities were material-based planning and manpower projections, working initially at Univac’s Shepard Road factory site. She became a specialist with Univac’s MAPPER software, suitably modified to calculate real-time “what-if” scenarios that were useful in proposal preparation and planning (for example) for the UYK-43 and UYK-44 programs. Subsequently, she worked with industrial automation and factory design, then moved into proposal development, project management, and contracts. A major effort was the Joint Direct Attack Munitions (JDAM). When Lockheed Martin’s Eagan facility closed, she moved to PDA which continued work for the U.S. Navy. She remarks on changes she observed in corporate culture with the Unisys merger and Lockheed Martin management. This material is based on work funded by the Alfred P. Sloan Foundation award B2014-07 “Tripling Women’s Participation in Computing (1965-1985).”Item Oral history interview with Matt Bishop(Charles Babbage Institute, 2013-06-06) Bishop, MattThis interview with computer security pioneer Matt Bishop discusses his doctoral research (access controls and the Take-Grant Protection Model) working with Dorothy Denning at Purdue University and subsequent career as a computer scientist and computer security specialist at the Research Institute of Advanced Computer Science, on the faculty at Dartmouth University, and on the faculty at University of California-Davis. Bishop’s research is wide-ranging and the interview touches on his work on Unix security and vulnerabilities, network security, intrusion detection, electronic voting systems, and other areas. Bishop recounts the project he launched to provide public (Web) access to seminal early papers in computer security, an important effort to facilitate computer security history and learning from the past. And he relates the evolution of the UC-Davis Computer Security Lab and its influence on the research field and education in computer security. He also discusses his role as an educator and the authoring of his textbook Computer Security: Art and Science (2002). This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Peter J. Denning(Charles Babbage Institute, 2013-04-10) Denning, Peter J.;This interview focuses on Peter Denning’s pioneering early contributions to computer security. This includes discussion of his perspective on CTSS and Multics as a graduate student at MIT, pioneering (with his student Scott Graham) the critical computer security concept of a reference monitor for each information object as a young faculty member at Princeton University, and his continuing contributions to the computer security field in his first years as a faculty member at Purdue University. Because of an extensive, career spanning oral history done with Denning as part of the ACM Oral History series (which includes his contributions as President of ACM, research on operating systems, and principles of computer science), this interview is primarily limited to Denning’s early career when computer security was one of his fundamental research areas. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”