Article ID: CBB851516279

Computer Security Discourse at RAND, SDC, and NSA (1958-1970) (2016)

unapi

The 1967 Spring Joint Computer Conference session organized by Willis Ware and the 1970 Ware Report are widely held by computer security practitioners and historians to have defined the field's origin. This article documents, describes, and assesses new evidence about two early multilevel access, time-sharing systems, SDC's Q-32 and NSA's RYE, and outlines its security-related consequences for both the 1967 SJCC session and 1970 Ware Report. Documentation comes from newly conducted Charles Babbage Institute oral histories, technical literature, archival documents, and recently declassified sources on National Security Agency computing. This evidence shows that early computer security emerged from the intersection of material, cultural, political, and social events and forces.

...More
Included in

Article Yost, Jeffrey R. (2016) Computer Security, Part 2 -- Editor's Introduction. IEEE Annals of the History of Computing (pp. 10-11). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB851516279/

Similar Citations

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Article Aspray, William F.; Cortada, James W.; (2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999 (/isis/citation/CBB189385729/)

Article Yost, Jeffrey R.; (2016)
Computer Security, Part 2 -- Editor's Introduction (/isis/citation/CBB453922047/)

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/)

Article Foley, Jillian; (March 2019)
Regulating Contested Reality: The Failure of US Encryption Regulations (/isis/citation/CBB627277329/)

Article Kneuper, Ralf; (2017)
Sixty Years of Software Development Life Cycle Models (/isis/citation/CBB236951329/)

Article Fidler, Bradley; Currie, Morgan; (2016)
Infrastructure, Representation, and Historiography in BBN's Arpanet Maps (/isis/citation/CBB826738719/)

Book Latil, Pierre de; (1957)
Thinking by machine: A study of cybernetics (/isis/citation/CBB001180074/)

Book Hally, Mike; (2005)
Electronic brains: Stories from the dawn of the computer age (/isis/citation/CBB001180065/)

Article Spicer, Dag; (2016)
Interview: Raymond Tomlinson: Email Pioneer, Part 1 (/isis/citation/CBB335794682/)

Book Martin Campbell-Kelly; Daniel D. Garcia-Schwartz; (2015)
From mainframes to smartphones: A history of the international computer industry (/isis/citation/CBB493120749/)

Chapter Edwards, Paul N.; (1998)
Why build computers? (/isis/citation/CBB001181683/)

Article Downey, Greg; (2004)
Jumping contexts of space and time in the history of computers and computing (/isis/citation/CBB001180038/)

Article Baker, Kevin T.; (2017)
Simulation and “Seduction” at the Policy Interface (/isis/citation/CBB450364367/)

Article James W. Cortada; (January-March 2021)
From Lapel Pins to Coffee Cups: Links Between Corporate and Material Culture, Lessons From IBM (/isis/citation/CBB400540115/)

Review McCray, W. Patrick; (2016)
Review of "Inside the Machine: Art and Invention in the Electronic Age" (/isis/citation/CBB765321999/)

Authors & Contributors
Fidler, Bradley Reuben
Yost, Jeffrey R.
Cortada, James W.
Tinn, Honghong
Baker, Kevin T.
Currie, Morgan
Concepts
History of Computing
Computer security; cyber security
Software
International Business Machines Corporation
Computer Simulation
Technology and government
Time Periods
20th century
21st century
Places
United States
Europe
Taiwan
Institutions
Control Data Corporation
Peter Norton Computing Corporation
Symantec Corporation
Computer History Museum
Club of Rome
United States. National Security Agency
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment