Browsing by Subject "Secure Communications Processor (SCOMP)"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Item Oral history interview with Roger R. Schell(Charles Babbage Institute, 2012-05-01) Schell, Roger R.Dr. Roger R. Schell, a retired U.S. Air Force Colonel and current president of Æsec Corporation, is one of the foremost contributors to and authorities on "high assurance" computer security. In this oral history he discusses his formulation of the secure kernel and reference monitor concepts (in the early 1970s), his work that led to security enhancements to Honeywell-Multics (mid-1970s), his role as deputy director of the National Computer Security Center (including leadership on TCSEC or “The Orange Book” in the early to mid-1980s), and commercial (high assurance) computer security enterprises he’s led since retiring from the Air Force. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Terry Benzel(Charles Babbage Institute, 2014-11-18) Benzel, TerryComputer security pioneer Terry Benzel discusses her education and programming work at Charles Draper Laboratory, before focusing on her work at MITRE Corporation, Trusted Information Systems (TIS), Network Associates and USC Information Sciences Institute (ISI). The MITRE discussion highlights her early role and perspectives on criteria evaluation (including her role in the SCOMP evaluation) in the formative years of TCSEC and after the publication of the criteria in 1983. Starting as a TIS principal scientist she rose to become a vice president in charge of the West Coast (Los Angeles) office, and later led a research team of 120 scientists/engineers for Network Associates. Among the technologies discussed are firewall development, and the security testbed at ISI. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”