{"id":197,"date":"2022-02-11T17:49:20","date_gmt":"2022-02-11T17:49:20","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2022\/02\/11\/over-the-rainbow-podcast-ep-3\/"},"modified":"2022-02-11T17:49:20","modified_gmt":"2022-02-11T17:49:20","slug":"over-the-rainbow-podcast-ep-3","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2022\/02\/11\/over-the-rainbow-podcast-ep-3\/","title":{"rendered":"Over the Rainbow Podcast Ep. 3"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p>Bob Blakley and Lorrie Cranor<\/p>\n<\/p><\/div>\n<div>\n<div style=\"color: #000000;\">\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-204414 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/02\/11175521\/roger-schell-400.png\" alt=\"Roger R. Schell\" width=\"250\" height=\"250\"\/>In the third episode of Over the Rainbow Podcast, hosts Lorrie Cranor and Bob Blakely discuss with Roger Schell the history of high-assurance systems and their place in the 21st-century cybersecurity landscape. Roger Schell led the development of the \u201cOrange Book\u201d \u2014 the first volume of the US Government\u2019s \u201cRainbow Series\u201d of Computer Security standards, which was one of the inspirations for this podcast\u2019s title.<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">The Orange Book was based on the concept of a reference monitor \u2014 an operating system kernel that could be proven secure because it was constructed in a way that supported a proof of its security. The government\u2019s effort to stimulate the emergence of a market for high-assurance systems in the 1980s and 1990s failed, but no subsequent system design principle has proven capable of achieving similar levels of security.<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em; text-align: right;\"><strong>Subscribe on <\/strong><br \/><strong>Google Podcasts | PodcastAddict | RSS Feed<\/strong><\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">We would like to thank our dedicated IEEE Computer Society volunteers. Their support and contributions make the Over the Rainbow: 21st Century Security and Privacy podcast possible.<\/p>\n<p><iframe loading=\"lazy\" style=\"border: none;\" title=\"Embed Player\" src=\"https:\/\/play.libsyn.com\/embed\/episode\/id\/22029968\/height\/192\/theme\/modern\/size\/large\/thumbnail\/yes\/custom-color\/25013e\/time-start\/00:00:00\/hide-playlist\/yes\" width=\"100%\" height=\"192\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">Original theme music composed and performed by <strong>Nina Cranor<\/strong>.<\/p>\n<hr\/>\n<\/div><\/div>\n<p><script>\n    !function(f,b,e,v,n,t,s)\n    {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n      n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n      if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n      n.queue=[];t=b.createElement(e);t.async=!0;\n      t.src=v;s=b.getElementsByTagName(e)[0];\n      s.parentNode.insertBefore(t,s)}(window,document,'script',\n      'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n    fbq('init', '2406379906149876');\n    fbq('track', 'PageView');\n  <\/script><script>\n    !function(f,b,e,v,n,t,s)\n    {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n      n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n      if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n      n.queue=[];t=b.createElement(e);t.async=!0;\n      t.src=v;s=b.getElementsByTagName(e)[0];\n      s.parentNode.insertBefore(t,s)}(window,document,'script',\n      'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n    fbq('init', '721875948349197');\n    fbq('track', 'PageView');\n  <\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/over-the-rainbow-podcast\/episode-3-roger-schell-high-assurance\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Bob Blakley and Lorrie Cranor In the third episode of Over the Rainbow Podcast, hosts Lorrie Cranor and Bob&hellip;<\/p>\n","protected":false},"author":1,"featured_media":198,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68,8,69,70,71,2],"tags":[],"class_list":["post-197","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-contact-tracing","category-cybersecurity","category-podcast","category-privacy","category-public-health","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/198"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}