Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE Annals of the History of Computing

Issue 2 • Apr.-June 2015

Filter Results

Displaying Results 1 - 16 of 16
  • Front Cover

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (597 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2015, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (903 KB)
    Freely Available from IEEE
  • Information Society, Domains, and Culture

    Publication Year: 2015, Page(s):2 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (62 KB) | HTML iconHTML
    Freely Available from IEEE
  • Editorial Board

    Publication Year: 2015, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (1255 KB)
    Freely Available from IEEE
  • Computer Security [Guest editors' introduction]

    Publication Year: 2015, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (189 KB) | HTML iconHTML
    Freely Available from IEEE
  • Notes on the Evolution of Computer Security Policy in the US Government, 1965-2003

    Publication Year: 2015, Page(s):8 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    The United States government and military helped lead the information technology revolution and were among the first to warn of its consequent dangers to privacy and national security. This article discusses White House, congressional, and high-level US Department of Defense (DoD) policy documents that illustrate the direction and pace of Washington's recognition of potential foreign threats to US... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Birth and Death of the Orange Book

    Publication Year: 2015, Page(s):19 - 31
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    This article traces the origins of US government-sponsored computer security research and the path that led from a focus on government-funded research and system development to a focus on the evaluation of commercial products. That path led to the creation of the Trusted Computer System Evaluation Criteria (TCSEC), or Orange Book. The TCSEC placed great emphasis on requirements for mandatory secur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring Risk: Computer Security Metrics, Automation, and Learning

    Publication Year: 2015, Page(s):32 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Risk management is widely seen as the basis for cybersecurity in contemporary organizations, but practitioners continue to dispute its value. This article analyzes debate over computer security risk management in the 1970s and 1980s United States, using this debate to enhance our understanding of the value of computer security metrics more generally. Regulators placed a high value on risk analysis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Origin and Early History of the Computer Security Software Products Industry

    Publication Year: 2015, Page(s):46 - 58
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    In the second half of the 1970s, established computer firms and new IT start-ups chose alternative paths to offer commercial access control systems to organizational mainframe computer users. These developments in effect launched the computer security software products industry with IBM's Resource Access Control Facility (RACF) and SKK's Access Control Facility 2 (ACF2). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Life of PKI: Sociotechnical Development of Korean Public-Key Infrastructure

    Publication Year: 2015, Page(s):59 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (971 KB) | HTML iconHTML

    Until the late 1990s, technology analysts expected public-key infrastructure (PKI) technology to be an essential element of online security systems. Today however, South Korea represents a unique example of widespread PKI use. This article traces the development of the Korean PKI and analyzes the social and cultural factors that contributed to the implementation and social adoption of the technolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet Design Tension between Surveillance and Security

    Publication Year: 2015, Page(s):72 - 83
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (710 KB) | HTML iconHTML

    The design tension between security and surveillance has existed for decades. This article specifically examines the protocol design tension between national security interests in surveillance versus network security in the early decades of the Internet and its predecessor networks. Using archival research and protocol-specific case studies, this article describes episodes in which the Internet En... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Doing History" in the Olden Days, 1970s-1990s

    Publication Year: 2015, Page(s):84 - 88
    Request permission for commercial reuse | PDF file iconPDF (519 KB) | HTML iconHTML
    Freely Available from IEEE
  • Reviews [2 book reviews; 2 film reviews]

    Publication Year: 2015, Page(s):89 - 93
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Events and Sightings

    Publication Year: 2015, Page(s):94 - 96
    Request permission for commercial reuse | PDF file iconPDF (2971 KB)
    Freely Available from IEEE
  • Rock Stars of CyberSecurity [Advertisement]

    Publication Year: 2015, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (1679 KB)
    Freely Available from IEEE
  • Focus on Your Job Search [Advertisement]

    Publication Year: 2015, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1901 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Annals of the History of Computing serves as a record of vital contributions which recount, preserve, and analyze the history of computing and the impact of computing on society.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Nathan Ensmenger
Indiana University, School of Informatics & Computing
nensmeng@indiana.edu