Browsing by Subject "Trusted Information Systems, Inc."
Now showing 1 - 5 of 5
- Results Per Page
- Sort Options
Item Oral history interview with David Elliott Bell(Charles Babbage Institute, 2012-09-24) Bell, David ElliottDavid Elliott Bell is a mathematician and computer security pioneer who co-developed the highly influential Bell-LaPadula security model. This interview discusses the context of his pivotal computer security work at MITRE Corporation, and his later contributions at the National Security Agency and Trusted Information Systems (including his leadership on TIS’s Trusted Xenix B2-rated system). This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Marvin Schaefer(Charles Babbage Institute, 2013-11-20) Schaefer, MarvinThis interview with computer security pioneer Marvin Schaefer discusses his roles and perspectives on computer security work at the System Development Corporation over many years (an organization he began working at in the summer of 1965), as well as his work at the National Computer Security Center in helping to create the Trusted Computer System Evaluation Criteria (TCSEC). With the latter he relates the challenges to writing the criteria, the debates over the structure and levels, and the involvement of criteria lawyers. He also summarizes his work at the company Trusted Information Systems. In addition to detailing his pivotal work in computer security, he offers insightful commentary on issues in the field such as the Bell-LaPadula Model, John McLean’s System Z, and other topics. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Stephen Walker(Charles Babbage Institute, 2012-11-08) Walker, StephenSteve Walker, a computer security pioneer and entrepreneur, began his career at the National Security Agency, before becoming a manager at ARPA’s Information Processing Techniques office in the first half the 1970s. He later served in the Office of the Secretary of Defense as an expert on computer security and organized key early meetings of some of the nation’s foremost computer security experts that were held at the National Bureau of Standards. In the early 1980s Walker’s career took an entrepreneurial turn as he founded Trusted Information Systems. This company became one of the earliest and most important computer security services and software products firms – producing Trusted Xenix and pioneering the firewall area of the computer security software industry. After TIS was sold, Walker worked for a number of years as an IT venture capitalist. Walker discusses his days at NSA, ARPA's IPTO, OSD, and his leadership of Trusted Information Systems in this interview. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Steven B. Lipner(Charles Babbage Institute, 2012-08-15) Lipner, Steven B.Steven B. Lipner is a computer security pioneer with more than 40 years of experience as a researcher, development manager, and general manager in IT Security. He helped form and served on the Anderson Panel for the Air Force in the early 1970s (was MITRE’s representative), oversaw path breaking computer security high assurance mathematical model work at MITRE later that decade, was a leader in Digital Equipment Corporation’s (DEC) effort to build an A1 (TCSEC certification) system in the 1980s, and led the creation of Microsoft’s Security Development Lifecycle in the 2000s. This interview focuses primarily on Lipner’s involvement on the Anderson Panel, his work at MITRE, and his work at DEC. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Terry Benzel(Charles Babbage Institute, 2014-11-18) Benzel, TerryComputer security pioneer Terry Benzel discusses her education and programming work at Charles Draper Laboratory, before focusing on her work at MITRE Corporation, Trusted Information Systems (TIS), Network Associates and USC Information Sciences Institute (ISI). The MITRE discussion highlights her early role and perspectives on criteria evaluation (including her role in the SCOMP evaluation) in the formative years of TCSEC and after the publication of the criteria in 1983. Starting as a TIS principal scientist she rose to become a vice president in charge of the West Coast (Los Angeles) office, and later led a research team of 120 scientists/engineers for Network Associates. Among the technologies discussed are firewall development, and the security testbed at ISI. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”