Access your Pro+ Content below.
Marcus Ranum: Q&A with clean-slate pioneer Peter G. Neumann
This article is part of the Information Security magazine issue of May 2013 / Volume 15 / No. 4
Peter G. Neumann Marcus Ranum caught with up with security pioneer Peter G. Neumann, Ph.D., who at age 80, is still a thought leader in the industry, and the moderator of the Association of Computing Machinery (ACM) Risks Forum. The principal scientist in SRI International’s Computer Science Lab, where he has worked for 41 years, Neumann is heading up research on computer system security platforms with security researcher, Robert N. Watson of Cambridge University’s Computer Laboratory, based on the Pentagon’s Defense Advanced Research Projects Agency’s (DARPA) Clean-slate design. In the 1960s at Bell Labs, Neumann worked on the Multiplexed Information and Computing Service (Multics), a mainframe operating system, developed in conjunction with Massachusetts Institute of Technology and General Electric, which served as a “timesharing utility” for numerous sites and academic institutions. Multics was the first operating system to use rings of protection or privilege levels to control access. Marcus Ranum: Peter, I've been a fan of ...
Access this PRO+ Content for Free!
Features in this issue
Peter G. Neumann shares his thoughts on the inherent complexity of trustworthiness and the evolutionary promise of clean-slate architectures.
Too many compliance programs miss the mark. Tony UcedaVelez explains how leveraging a threat model can re-energize your strategy.
It’s hard to declare Apple security as superior to its competitors, but it’s also hard to fault it as inferior.
Assumption of breach is the new norm. Can this shift help organizations build better levels of data breach protection?
Columns in this issue
Marcus Ranum, security expert and Information Security magazine columnist, goes one-on-one with clean-slate luminary Peter G. Neumann of SRI International and formerly Bell Labs.
Managers need more training about technical security threats and input into IT policies that threaten productivity.