Content deleted Content added
m fix cite error |
m lk NSA |
||
Line 1:
'''''Security and privacy in computer systems''''' is a
<ref name="rand-2008-vignettes">{{cite book|first=Willis H.|last=Ware|author-link=Willis Ware|publisher=RAND Corporation|isbn=978-0-8330-4513-3|year=2008|title=RAND and the information evolution : a history in essays and vignettes|url=https://www.rand.org/content/dam/rand/pubs/corporate_pubs/2008/RAND_CP537.pdf|quote=From this milieu, the topic of computer security—later to be called information-system security and currently also referred to as protection of the national information infrastructure—moved from the world of classified defense interests into public view for the first time. A few people—Bob Patrick, Pat Haverty, and Willis Ware among others—all then at the RAND Corporation ... had, in the late 1950s and early 1960s, been talking about the growing dependence of the country and its institutions on computer technology. It concerned them that the installed systems might not be able to protect themselves and their data against intrusive and destructive attacks. While there had been a few papers at the conferences on social effects of burgeoning computer technology, they decided that it was time to more directly bring the security aspect of computer systems to the attention of the technology and user communities. A fortuitous enabling event was the development within the [[National Security Agency]] (NSA) of a remote-access time-sharing system with a full set of security-access controls, running on a UNIVAC 494 machine, and serving terminals and users not only within the headquarters building at Fort George G. Meade, Maryland, but also worldwide. Willis Ware knew of the existence and details of the system. It proved possible to have a paper about the NSA system presented in a public forum, and, with two others from RAND to help—Harold Petersen and Rein Turn—plus Bernard Peters of NSA, a group of papers was organized and offered to the SJCC conference management as a ready-made additional paper session to be chaired by Ware. The conference accepted the offer, and the session was presented at the Atlantic City (N.J.) Convention Hall in 1967.}}</ref>
<ref>{{cite journal|journal=Rutgers journal of computers and the law|volume=5|year=1975|url=https://books.google.co.uk/books?id=ZR9MAQAAIAAJ&dq=1967+spring+joint+computer+conference |title=Computer Security|page=221|quote=The earliest concerns arose in connection with computer applications in the military, where large databases and remote access to central computing files first emerged. With good reason, much of the information on how to make military systems secure remains classified. Such expertise was first brought to civilians during the 1967 Spring Joint Computer Conference.}}</ref>
|