Oral history interview with William H. Murray

Thumbnail Image

View/Download File

Persistent link to this item

View Statistics

Journal Title

Journal ISSN

Volume Title


Oral history interview with William H. Murray

Published Date



Charles Babbage Institute


Oral History


In this interview computer security pioneer William Murray begins by discussing early work experiences and influences (his father was an IBM CE and manager, and his mother was a keypunch operator). The bulk of the interview focuses on his work at IBM in computer security and his reflections on developments in this field. This includes efforts with computer security at IBM SHARE, Bob Courtney as an early leader at IBM in this field, Horst Feistel and the cryptographic research group at IBM, MVS TSO, IBM’s MVS Integrity Commitment, TCSEC, and RACF. He also provides context to a number of his publications including his influential Access Control Facility for AAS and Data Security and Controls. Murray was an influential figure with ISC-squared and the CISSP security credential and the auditing and forensics sides to security (working as a consultant for Deloitte & Touche and Ernst & Young after leaving IBM). This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”


Transcript, 100 pp.

Related to



Series/Report Number

Funding information

National Science Foundation Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Isbn identifier

Doi identifier

Previously Published Citation

William H. Murray, OH 433. Oral history interview by Jeffrey R. Yost, 24 September 2013, New Canaan, CT. Charles Babbage Institute, University of Minnesota, Minneapolis. http://hdl.handle.net/11299/163163

Suggested citation

Murray, William H.. (2013). Oral history interview with William H. Murray. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/163163.

Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.