Browsing by Subject "SHARE (Association)"
Now showing 1 - 5 of 5
- Results Per Page
- Sort Options
Item Oral history interview with Barry Schrager(Charles Babbage Institute, 2012-05-24) Schrager, BarryBarry Schrager, who has a M.S. in applied mathematics from Northwestern University, is a seminal figure in the design and development of early commercial computer security software products. From 1968 to 1978 he served as Assistant Director of the University of Illinois-Chicago Circle Computer Center, where activity of student hackers on the center’s time-shared system led him to investigate methods and tools to achieve greater security. In the early 1970s he became involved with IBM SHARE, and led a committee of emerging computer security experts – SHARE’s Data Security and Management Group. Schrager and his group’s 1974 SHARE white paper defined access control requirements to achieve security, which led to IBM’s 1976 computer security software product, Resource Access Control Facility (RACF). Initially this product fell short of the requirements outlined in the white paper and Schrager and a colleague, Eberhard Klemens, developed a prototype Access Control Facility (ACF) which met the requirements. In 1978 these two teamed up with Scott Krueger to found SKK, Inc. and refine this computer security software product as ACF2 for its first customer London Life Insurance (Ontario, Canada). Soon thereafter SKK sold this product to General Motors and many other major corporations/organizations. ACF2 became a billion dollar product that is now owned by Computer Associates. This oral history concentrates on Schrager’s work with SHARE, the creation of ACF2, and his leadership of SKK, Inc. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Donn B. Parker(Charles Babbage Institute, 2003-05-14) Parker, Donn B.Donn Parker, a renowned expert on computer security, begins by discusses his education and early programming and managerial work at General Dynamics and the Control Data Corporation (CDC). The bulk of the interview concentrates on developments and contexts to Parker’s subsequent work at SRI on computer security and computer crime. This pioneering research, which was funded by the National Science Foundation and the Department of Justice, provided Parker with the substance for a number of influential books. Parker also discusses the emergence of the computer security industry, IBM’s contributions to the field, and computer security legislation. He concludes by addressing aspects of the contemporary computer security situation, best practices to prevent breaches, and his formation of the International Information Integrity Institute (I4).Item Oral history interview with Eldon Worley(Charles Babbage Institute, 2012-11-15) Worley, EldonEldon Worley was a longtime software scientist/engineer at IBM Research in San Jose. He pioneered Information Management Facility (IMF), a path breaking security system that was the underlying basis for the IBM security product Resource Access Control Facility, or RACF. After this work left IBM Research to be developed into a product, Worley continued to analyze and provide feedback to IBM’s development staff. RACF has gone through many different releases since its first iteration in the mid-1970s. Worley provides background on the origins of IMF and RACF, and how RACF evolved over two decades—including perspective on customer installations of RACF in the UK, where he spent time in both the mid-1970s and mid-1980s. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with R. Blair Smith(Charles Babbage Institute, 1980-05) Smith, R. BlairAfter describing his early life, Smith describes his move to International Business Machines (IBM) as a salesman. He discusses his experiences with the IBM 701 and 702 computers and his role in founding the Digital Computer Association (later SHARE). Smith also recalls how a chance meeting with C. R. Smith, president of American Airlines, eventually led to the development of the SABRE system. He also describes the design, sale, and implementation of the SABRE system and the changes caused by the System/360.Item Oral history interview with William H. Murray(Charles Babbage Institute, 2013-09-24) Murray, William H.In this interview computer security pioneer William Murray begins by discussing early work experiences and influences (his father was an IBM CE and manager, and his mother was a keypunch operator). The bulk of the interview focuses on his work at IBM in computer security and his reflections on developments in this field. This includes efforts with computer security at IBM SHARE, Bob Courtney as an early leader at IBM in this field, Horst Feistel and the cryptographic research group at IBM, MVS TSO, IBM’s MVS Integrity Commitment, TCSEC, and RACF. He also provides context to a number of his publications including his influential Access Control Facility for AAS and Data Security and Controls. Murray was an influential figure with ISC-squared and the CISSP security credential and the auditing and forensics sides to security (working as a consultant for Deloitte & Touche and Ernst & Young after leaving IBM). This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”