Murray, William H.2014-05-132014-05-132013-09-24William H. Murray, OH 433. Oral history interview by Jeffrey R. Yost, 24 September 2013, New Canaan, CT. Charles Babbage Institute, University of Minnesota, Minneapolis. http://hdl.handle.net/11299/163163OH 433https://hdl.handle.net/11299/163163Transcript, 100 pp.In this interview computer security pioneer William Murray begins by discussing early work experiences and influences (his father was an IBM CE and manager, and his mother was a keypunch operator). The bulk of the interview focuses on his work at IBM in computer security and his reflections on developments in this field. This includes efforts with computer security at IBM SHARE, Bob Courtney as an early leader at IBM in this field, Horst Feistel and the cryptographic research group at IBM, MVS TSO, IBM’s MVS Integrity Commitment, TCSEC, and RACF. He also provides context to a number of his publications including his influential Access Control Facility for AAS and Data Security and Controls. Murray was an influential figure with ISC-squared and the CISSP security credential and the auditing and forensics sides to security (working as a consultant for Deloitte & Touche and Ernst & Young after leaving IBM). This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”en-USComputer historyComputer securityMVS Time-Sharing OptionData Encryption StandardCertified Information System Security Professional (CISSP)International Information System Security Certification Consortium, (ISC)2IBM AS/400 (Computer)SHARE (Association)Resource Access Control Facility (RACF)TCSEC (The Orange Book)Trusted Computer System Evaluation Criteria (TCSEC)MULTICSForensicsIBMInternational Business Machines Corporation.Oral history interview with William H. MurrayOral History