University of Minnesota Twin Cities
Persistent link for this community
Browse
Browsing University of Minnesota Twin Cities by Type "Oral history interview"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Oral History Interview with Dr. Chuck Easttom(Charles Babbage Institute, 2024-06-12) Easttom (Charles Babbage Institute) , ChuckThis oral history interview is sponsored by and a part of NSF 2202484 “Mining a Useable Past: Perspectives, Paradoxes, and Possibilities with Security and Privacy,” at the Charles Babbage Institute. The interview begins with Chuck Easttom recounting how he got interested in computers. His interest developed from reading magazines and gradually taking up part-time jobs repairing PCs. He describes his developing interest in cybersecurity alongside the wide range of experiences that inform his work. He describes how his consulting business at Chuck Easttom Consulting grew. Described how the Certification industry was like. His first court work from 2004 as patent cases, before a private investigator's license related to digital forensic work in Dallas, Texas. Describes experiences publishing textbooks. Discusses the education of next generation of cybersecurity professionals. He related his experiences mentoring in a firm as compared to the university, and the implications of newest quantum computing technology for security at Vanderbilt University. The interview ends with final reflections on generative AI and the meaning of being an engineer in contrast with simply using the word when being a programmer.Item Oral History Interview with Dr. Paul van Oorschot(Charles Babbage Institute, 2024-06-12) van Oorschot (Charles Babbage Institute), PaulThis oral history interview is sponsored by and a part of NSF 2202484 “Mining a Useable Past: Perspectives, Paradoxes, and Possibilities with Security and Privacy,” at the Charles Babbage Institute. The interview is with computer security and cryptography pioneer Paul van Oorschot. He begins by recounting his time in high school, and how he obtained both his undergraduate and graduate degrees at the University of Waterloo, where he played on the basketball team. He tells of Wes Graham' influence and how working within the University of Waterloo's Computer Systems Group led him to develop interests in computer science which grew out of his longtime interest in mathematics. He began working at Bell-Northern Research (BNR) and discusses his research there. He transitioned into academe and a Professorship in Computer Science in 2002 with the Canada Research Chairs Program at Carleton University. He discusses public key infrastructure in industry and research in this area during the 1990s, and also how he and his students got into graphical password schemes. He shares briefly about his 20 patents, mostly in certificates and certificate management. He relates what the “crypto wars” were like from a political economy context in Canada. He moves on to offer context to the textbooks he has written. He relates his philosophy in teaching undergraduate and graduate students. And he also touches upon cryptocurrency from technical and societal perspective. Finally, he reflects on the implications of artificial intelligence, as well as on solving problems of interest to society and professional incentives.Item Oral History Interview with Dr. Stephen Thomas Kent(Charles Babbage Institute, 2024-06-12) Kent (Charles Babbage Institute), SteveThis oral history interview is sponsored by and a part of NSF 2202484 “Mining a Useable Past: Perspectives, Paradoxes, and Possibilities with Security and Privacy,” at the Charles Babbage Institute. The interview begins with Steve Kent recounting his time in high school, and telling of how he became interested in computer science and attended Loyola University and then MIT later as a graduate student. He related the influence of Jerome (Jerry) Saltzer and Mike Schroeder on his master thesis and his career. He also discussed the experience with Dave Clark as his mentor. He shared his experiences working at a number of prominent organizations such as RAND, BBN, MITRE, partnership with Trusted Information Systems, and later his work serving on the Internet Architecture Board, GTE Internet Working Security Practices Center, and BBN Communications. Kent discussed his involvement in various projects, including Black-Crypto-Red, a crypto module at FIPS 140-1 level 3, Privacy Enhanced Mail, and his work at the IEEE Security and Privacy Symposium. Moreover, he also offered context to various research projects, from his doctoral dissertation to the report on Flip Jack algorithm, reports in 2000 from the Committee for Authentication Technologies, the Privacy Implications for Computer Science and Telecommunications Board of the National Research Council and his Securing Border Gateway Protocol article. He provides his perspective on the Orange Book, security economics, certification authorities, the Clipper Chip issue, and the impact of AI on security.