Oral history interview with Thomas A. Berson by Rebecca Slayton

View/Download File

Persistent link to this item

Statistics
View Statistics

Journal Title

Journal ISSN

Volume Title

Title

Oral history interview with Thomas A. Berson by Rebecca Slayton

Published Date

2014-04-18

Publisher

Charles Babbage Institute

Type

Oral History

Abstract

This interview with computer security pioneer Tom Berson discusses his early interest in computers, formal training in physics and computer science, and career in computer and network security industry. Berson earned a bachelor’s degree in physics before going to IBM Yorktown Heights in the late 1960s. He worked as a consultant while earning a Ph.D. in computer science from University College London, which he completed in 1977. After completing the Ph.D. he went to work for Ford Aerospace and Communications Corporation in California, where he worked on the Kernelized Secure Operating System (KSOS). In 1979 he and five others from Ford started a computer networking company, Sytek, where Berson was involved in several innovations related to network security. In 1986 he founded a new start-up, Anagram. Berson also discusses his involvement in IEEE Symposium on Security and Privacy, the International Association for Cryptologic Research (IACR), the influence of the Orange Book, and the future of the field of computer security. This interview is part of a project conducted by Rebecca Slayton and funded by an ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.”

Description

Transcript, 92pp.

Related to

Replaces

License

Series/Report Number

Funding information

ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.”

Isbn identifier

Doi identifier

Previously Published Citation

Thomas A. Berson, OH 506. Oral history interview by Rebecca Slayton, 18 April 2014, Palo Alto, CA. Charles Babbage Institute, University of Minnesota, Minneapolis.

Suggested citation


Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.