Between Dec 19, 2024 and Jan 2, 2025, datasets can be submitted to DRUM but will not be processed until after the break. Staff will not be available to answer email during this period, and will not be able to provide DOIs until after Jan 2. If you are in need of a DOI during this period, consider Dryad or OpenICPSR. Submission responses to the UDC may also be delayed during this time.
 

Oral History Interview with Dr. Stephen Thomas Kent

Loading...
Thumbnail Image

Persistent link to this item

Statistics
View Statistics

Journal Title

Journal ISSN

Volume Title

Title

Oral History Interview with Dr. Stephen Thomas Kent

Published Date

2024-06-12

Publisher

Charles Babbage Institute

Type

Oral history interview
Oral History

Abstract

This oral history interview is sponsored by and a part of NSF 2202484 “Mining a Useable Past: Perspectives, Paradoxes, and Possibilities with Security and Privacy,” at the Charles Babbage Institute. The interview begins with Steve Kent recounting his time in high school, and telling of how he became interested in computer science and attended Loyola University and then MIT later as a graduate student. He related the influence of Jerome (Jerry) Saltzer and Mike Schroeder on his master thesis and his career. He also discussed the experience with Dave Clark as his mentor. He shared his experiences working at a number of prominent organizations such as RAND, BBN, MITRE, partnership with Trusted Information Systems, and later his work serving on the Internet Architecture Board, GTE Internet Working Security Practices Center, and BBN Communications. Kent discussed his involvement in various projects, including Black-Crypto-Red, a crypto module at FIPS 140-1 level 3, Privacy Enhanced Mail, and his work at the IEEE Security and Privacy Symposium. Moreover, he also offered context to various research projects, from his doctoral dissertation to the report on Flip Jack algorithm, reports in 2000 from the Committee for Authentication Technologies, the Privacy Implications for Computer Science and Telecommunications Board of the National Research Council and his Securing Border Gateway Protocol article. He provides his perspective on the Orange Book, security economics, certification authorities, the Clipper Chip issue, and the impact of AI on security.

Description

Related to

Replaces

License

Series/Report Number

2202484 ; 2

Funding information

NSF

Isbn identifier

Doi identifier

Previously Published Citation

Other identifiers

Suggested citation


Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.