MATHEMATICS, TECHNOLOGY, AND TRUST - FORMAL VERIFICATION, COMPUTER SECURITY, AND THE US MILITARY

Citation
D. Mackenzie et G. Pottinger, MATHEMATICS, TECHNOLOGY, AND TRUST - FORMAL VERIFICATION, COMPUTER SECURITY, AND THE US MILITARY, IEEE annals of the history of computing, 19(3), 1997, pp. 41-59
Citations number
78
Categorie Soggetti
Computer Sciences, Special Topics","History & Philosophy of Sciences
ISSN journal
10586180
Volume
19
Issue
3
Year of publication
1997
Pages
41 - 59
Database
ISI
SICI code
1058-6180(1997)19:3<41:MTAT-F>2.0.ZU;2-7
Abstract
A distinctive concern in the U.S. military for computer security dates from the emergence of time-sharing systems in the 1960s. This paper t races the subsequent development of the idea of a ''security kernel'' and of the mathematical modeling of security, focusing in particular o n the paradigmatic Bell-LaPadula model. The paper examines the connect ions between computer security and formal, deductive verification of t he properties of computer systems. It goes on to discuss differences b etween the cultures of communications security and computer security, the bureaucratic turf war over security, and the emergence and impact of the Department of Defense's Trusted Computer System Evaluation Crit eria (the so-called Orange Book), which effectively took its final for m in 1983. The paper ends by outlining the fragmentation of computer s ecurity since the Orange Book was written.