Jump to content

Phillip Hallam-Baker

From Wikipedia, the free encyclopedia

Phillip Hallam-Bakeris a computer scientist, mostly known for contributions to Internet security, since the design ofHTTPatCERNin 1992. Self-employed since 2018 as a consultant and expert witness in court cases, he previously worked atComodo,Verisign,and theMIT Artificial Intelligence Laboratory.[1]He is a frequent participant inIETFmeetings and discussions, and has written a number ofRFCs.In 2007 he authoredthe dotCrime Manifesto: How to Stop Internet Crime;[2]Ron Rivestused it as a source of project ideas for his course on Computer and Network Security at MIT in 2013.[3]

Biography

[edit]

Hallam-Baker has a degree in electronic engineering from theSchool of Electronics and Computer Science, University of Southamptonand a doctorate in Computer Science from the Nuclear Physics Department at Oxford University. He was appointed a Post Doctoral Research Associate at DESY in 1992 and CERN Fellow in 1993.

Hallam-Baker worked with the Clinton-Gore ’92 Internet campaign. While at the MIT Laboratory for Artificial Intelligence, he worked on developing a security plan and performed work on securing high-profile federal government internet sites.

IETF Contributions

[edit]
  • RFC2069with J. Franks, J. Hostetler, P. Leach, A. Luotonen, E. Sink, L. Stewart,An Extension to HTTP: Digest Access Authentication
  • RFC2617with J. Franks, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, L. Stewart,HTTP Authentication: Basic and Digest Access Authentication
  • RFC4386with S. Boeyen,Internet X.509 Public Key Infrastructure Repository Locator Service
  • RFC5585with T. Hansen, D. Crocker,DomainKeys Identified Mail (DKIM) Service Overview
  • RFC5863with T. Hansen, E. Siegel, D. Crocker,DomainKeys Identified Mail (DKIM) Development, Deployment, and Operations
  • RFC6277with S. Santesson,Online Certificate Status Protocol Algorithm Agility
  • RFC6844with R. Stradling,DNS Certification Authority Authorization (CAA) Resource Record
  • RFC6920with S. Farrell, D. Kutscher, C. Dannewitz, B. Ohlman, A. Keranen,Naming Things with Hashes

References

[edit]
  1. ^"LinkedIn".LinkedIn.October 2021.Retrieved25 November2021.
  2. ^Phillip Hallam-Baker (20 December 2007).the dotCrime Manifesto: How to Stop Internet Crime.Addison-Wesley Professional.ISBN978-0321503589.Retrieved3 June2014.
  3. ^"6.857: Computer and Network Security".mit.edu.MIT.2013.Retrieved3 June2014.
[edit]