Search this site
Embedded Files
Cyber-Security-Engineering.com
  • Home
  • Introduction
    • Lyndon Pierson
    • Blaine Burnham
  • Curriculum
    • Description of this Curriculum
    • Course 0: Introduction to Cyber Security Engineering
    • Course 1: Foundations of Information Security
      • "Foundations" Full Course Description
      • Course 1.1 Introduction to Information Assurance
      • Course 1.2 Introduction to Policy
      • Course 1.3: Introduction to Assurance
    • Course 2: Cryptography
      • "Cryptography" Full Course Description
    • Course 3: Policy: The Foundation of a Successful Information Assurance Prog
      • "Policy" Full Course Description
    • Course 4: Assurance in Cyber Space and Applied to Information Security
      • "Assurance" Full Course Description
    • Course 5: Network Security
      • "Network Security" Full Course Description
    • Course 6 Trusted Systems Design, Analysis, and Development
      • "Trusted Systems Design" Full Course Description
    • Course 7: Secure Systems Administration
      • "Secure Systems Administration" Full Course Description
    • Course 8: Secure Systems Engineering
      • "Secure Systems Engineering" Full Course Description
    • Course 9: Computer and Network Forensics
      • "Forensics" Full Course Description
  • Courseware
  • Resources
    • Foundational Papers in Cyber Security Engineering
    • Bibliography
    • Foundational Paper Timeline
Cyber-Security-Engineering.com
  • Home
  • Introduction
    • Lyndon Pierson
    • Blaine Burnham
  • Curriculum
    • Description of this Curriculum
    • Course 0: Introduction to Cyber Security Engineering
    • Course 1: Foundations of Information Security
      • "Foundations" Full Course Description
      • Course 1.1 Introduction to Information Assurance
      • Course 1.2 Introduction to Policy
      • Course 1.3: Introduction to Assurance
    • Course 2: Cryptography
      • "Cryptography" Full Course Description
    • Course 3: Policy: The Foundation of a Successful Information Assurance Prog
      • "Policy" Full Course Description
    • Course 4: Assurance in Cyber Space and Applied to Information Security
      • "Assurance" Full Course Description
    • Course 5: Network Security
      • "Network Security" Full Course Description
    • Course 6 Trusted Systems Design, Analysis, and Development
      • "Trusted Systems Design" Full Course Description
    • Course 7: Secure Systems Administration
      • "Secure Systems Administration" Full Course Description
    • Course 8: Secure Systems Engineering
      • "Secure Systems Engineering" Full Course Description
    • Course 9: Computer and Network Forensics
      • "Forensics" Full Course Description
  • Courseware
  • Resources
    • Foundational Papers in Cyber Security Engineering
    • Bibliography
    • Foundational Paper Timeline
  • More
    • Home
    • Introduction
      • Lyndon Pierson
      • Blaine Burnham
    • Curriculum
      • Description of this Curriculum
      • Course 0: Introduction to Cyber Security Engineering
      • Course 1: Foundations of Information Security
        • "Foundations" Full Course Description
        • Course 1.1 Introduction to Information Assurance
        • Course 1.2 Introduction to Policy
        • Course 1.3: Introduction to Assurance
      • Course 2: Cryptography
        • "Cryptography" Full Course Description
      • Course 3: Policy: The Foundation of a Successful Information Assurance Prog
        • "Policy" Full Course Description
      • Course 4: Assurance in Cyber Space and Applied to Information Security
        • "Assurance" Full Course Description
      • Course 5: Network Security
        • "Network Security" Full Course Description
      • Course 6 Trusted Systems Design, Analysis, and Development
        • "Trusted Systems Design" Full Course Description
      • Course 7: Secure Systems Administration
        • "Secure Systems Administration" Full Course Description
      • Course 8: Secure Systems Engineering
        • "Secure Systems Engineering" Full Course Description
      • Course 9: Computer and Network Forensics
        • "Forensics" Full Course Description
    • Courseware
    • Resources
      • Foundational Papers in Cyber Security Engineering
      • Bibliography
      • Foundational Paper Timeline

Foundational Paper Timeline

1945 Von Neumann "First Draft of a Report on the EDVAC" (Von Neumann Architecture)

1948 Shannon "Mathematical Theory of Communication"

1949 Shannon "Communication Theory of Secrecy Systems"

1970 Ware Report

1972 Anderson Report

1975 Saltzer & Schroeder "Protection of Information in Computer Systems"

1973 Bell-Lapadula Confidentiality Model

1975 Biba Integrity Model

1976 Data Encryption Standard (DES)

1978 Padlipsky - Limits of End-to-End Encryption

1980 Myers - Subversion: The Neglected Aspect of Computer Security

1985 TCSEC (Orange Book)

1990 TNI of TCSEC (Red Book)


Copyright 2020 Cyber-Security-Engineering.com
Report abuse
Page details
Page updated
Report abuse