Oral history interview with Karl Levitt

2013-06-06
Loading...
Thumbnail Image

Persistent link to this item

Statistics
View Statistics

Journal Title

Journal ISSN

Volume Title

Title

Oral history interview with Karl Levitt

Published Date

2013-06-06

Publisher

Charles Babbage Institute

Type

Oral History

Abstract

Computer security pioneer discusses his educational background and early career, with the bulk of the interview on his approximately four decades plus focus on computer security research. He discusses his work with fault-tolerant systems, the institutional setting and his research and management roles at SRI (including PSOS, IDES/NIDES, etc.). He also discusses joining the faculty at UC-Davis in Computer Science and launching its Computer Security Laboratory, which has been influential in educating and placing computer security specialists in academe, government, and industry. Also discussed is his post-IDES/NIDES work on intrusion detection, voting systems and security, federal funding for computer security, his program manager role for Trustworthy Computing at NSF, and other topics. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Description

Transcript, 89 pps.

Related to

Replaces

License

Series/Report Number

Funding information

National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Isbn identifier

Doi identifier

Previously Published Citation

Karl Levitt, OH 455. Oral history interview by Jeffrey R. Yost, 6 June 2013, Davis, California. Charles Babbage Institute, University of Minnesota, Minneapolis.

Other identifiers

OH 455

Suggested citation

Levitt, Karl. (2013). Oral history interview with Karl Levitt. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/170091.

Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.