Misa, Thomas J. (Author)
The 1967 Spring Joint Computer Conference session organized by Willis Ware and the 1970 Ware Report are widely held by computer security practitioners and historians to have defined the field's origin. This article documents, describes, and assesses new evidence about two early multilevel access, time-sharing systems, SDC's Q-32 and NSA's RYE, and outlines its security-related consequences for both the 1967 SJCC session and 1970 Ware Report. Documentation comes from newly conducted Charles Babbage Institute oral histories, technical literature, archival documents, and recently declassified sources on National Security Agency computing. This evidence shows that early computer security emerged from the intersection of material, cultural, political, and social events and forces.
...MoreArticle Yost, Jeffrey R. (2016) Computer Security, Part 2 -- Editor's Introduction. IEEE Annals of the History of Computing (pp. 10-11).
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Article
Aspray, William F.;
Cortada, James W.;
(2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999
(/isis/citation/CBB189385729/)
Article
Yost, Jeffrey R.;
(2016)
Computer Security, Part 2 -- Editor's Introduction
(/isis/citation/CBB453922047/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/isis/citation/CBB570334134/)
Article
Foley, Jillian;
(March 2019)
Regulating Contested Reality: The Failure of US Encryption Regulations
(/isis/citation/CBB627277329/)
Article
Kneuper, Ralf;
(2017)
Sixty Years of Software Development Life Cycle Models
(/isis/citation/CBB236951329/)
Article
Fidler, Bradley;
Currie, Morgan;
(2016)
Infrastructure, Representation, and Historiography in BBN's Arpanet Maps
(/isis/citation/CBB826738719/)
Book
Latil, Pierre de;
(1957)
Thinking by machine: A study of cybernetics
(/isis/citation/CBB001180074/)
Article
Honghong Tinn;
(October 2018)
Modeling Computers and Computer Models: Manufacturing Economic-Planning Projects in Cold War Taiwan, 1959–1968
(/isis/citation/CBB062296277/)
Book
Hally, Mike;
(2005)
Electronic brains: Stories from the dawn of the computer age
(/isis/citation/CBB001180065/)
Article
Spicer, Dag;
(2016)
Interview: Raymond Tomlinson: Email Pioneer, Part 1
(/isis/citation/CBB335794682/)
Book
Martin Campbell-Kelly;
Daniel D. Garcia-Schwartz;
(2015)
From mainframes to smartphones: A history of the international computer industry
(/isis/citation/CBB493120749/)
Book
Shetterly, Margot Lee;
(2016)
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
(/isis/citation/CBB747088865/)
Chapter
Edwards, Paul N.;
(1998)
Why build computers?
(/isis/citation/CBB001181683/)
Article
Downey, Greg;
(2004)
Jumping contexts of space and time in the history of computers and computing
(/isis/citation/CBB001180038/)
Article
Mirowski, Alexander;
(2017)
At the Electronic Crossroads Once Again: The Myth of the Modern Computer Utility in the United States
(/isis/citation/CBB369914463/)
Article
Baker, Kevin T.;
(2017)
Simulation and “Seduction” at the Policy Interface
(/isis/citation/CBB450364367/)
Article
Lewis, Nicholas;
(2017)
Purchasing Power: Rivalry, Dissent, and Computing Strategy in Supercomputer Selection at Los Alamos
(/isis/citation/CBB909353193/)
Article
James W. Cortada;
(January-March 2021)
From Lapel Pins to Coffee Cups: Links Between Corporate and Material Culture, Lessons From IBM
(/isis/citation/CBB400540115/)
Review
McCray, W. Patrick;
(2016)
Review of "Inside the Machine: Art and Invention in the Electronic Age"
(/isis/citation/CBB765321999/)
Be the first to comment!