default search action
Dorothy E. Denning
Person information
- affiliation: Naval Postgraduate School, Department of Defense Analysis, Monterey, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j40]Peter J. Denning, Dorothy E. Denning:
Dilemmas of artificial intelligence. Commun. ACM 63(3): 22-24 (2020)
2010 – 2019
- 2015
- [j39]Dorothy E. Denning:
Toward more secure software. Commun. ACM 58(4): 24-26 (2015) - 2014
- [j38]Dorothy E. Denning:
Framework and principles for active cyber defense. Comput. Secur. 40: 108-113 (2014) - 2012
- [j37]Dorothy E. Denning:
Stuxnet: What Has Changed? Future Internet 4(3): 672-687 (2012) - 2011
- [j36]Thomas A. Berson, Dorothy E. Denning:
Cyberwarfare. IEEE Secur. Priv. 9(5): 13-15 (2011) - [c23]Hsinchun Chen, Dorothy E. Denning, Nancy Roberts, Catherine A. Larson, Ximing Yu, Chunneng Huang:
The Dark Web Forum Portal: From multi-lingual to video. ISI 2011: 7-14 - 2010
- [j35]Peter J. Denning, Dorothy E. Denning:
Discussing cyber attack. Commun. ACM 53(9): 29-31 (2010) - [c22]Yulei Zhang, Shuo Zeng, Chunneng Huang, Li Fan, Ximing Yu, Yan Dang, Catherine A. Larson, Dorothy E. Denning, Nancy Roberts, Hsinchun Chen:
Developing a Dark Web collection and infrastructure for computational and social sciences. ISI 2010: 59-64
2000 – 2009
- 2009
- [j34]Daniel Massey, Dorothy E. Denning:
Guest Editors' Introduction: Securing the Domain Name System. IEEE Secur. Priv. 7(5): 11-13 (2009) - 2008
- [j33]Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Veríssimo:
Information Assurance Technology Forecast 2008. IEEE Secur. Priv. 6(1): 16-23 (2008) - 2004
- [j32]Peter J. Denning, Dorothy E. Denning:
Artificial stupidity. Commun. ACM 47(5): 112 (2004) - 2003
- [c21]Dorothy E. Denning:
Cyber Security as an Emergent Infrastructure. World Conference on Information Security Education 2003: 1-2 - 2000
- [b3]Dorothy E. Denning:
Information warefare and security. Addison-Wesley-Longman 2000, ISBN 978-0-201-43303-6, pp. I-XVII, 1-522 - [j31]Dorothy E. Denning:
Hacktivism and other net crimes. Ubiquity 2000(August): 14 (2000)
1990 – 1999
- 1996
- [j30]Dorothy E. Denning, Dennis K. Branstad:
A Taxonomy for Key Escrow Encryption Systems. Commun. ACM 39(3): 34-40 (1996) - [j29]Margaret Anne Pierce, Jacques Berleur, Joseph R. Herkert, Dorothy E. Denning, Charles Dunlop, Chuck Huff:
Responses to "The consequences of computing". SIGCAS Comput. Soc. 26(1): 7-10 (1996) - [p1]Dorothy E. Denning:
Clipper Chip Will Reinforce Privacy. Computerization and Controversy, 2nd Ed. 1996: 659-663 - 1995
- [j28]Jeffrey G. Long, Dorothy E. Denning:
Ultra-Structure: A Design Theory for Complex Systems and Processes. Commun. ACM 38(1): 103-120 (1995) - 1994
- [j27]Susan Landau, Stephen T. Kent, Clinton Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel:
Crypto Policy Perspectives. Commun. ACM 37(8): 115-121 (1994) - [j26]Dorothy E. Denning, Miles Smid:
Key escrowing today. IEEE Commun. Mag. 32(9): 58-68 (1994) - [j25]Dorothy E. Denning:
The US key escrow encryption technology. Comput. Commun. 17(7): 453-457 (1994) - [e2]Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu:
CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994. ACM 1994, ISBN 0-89791-732-4 [contents] - 1993
- [j24]Dorothy E. Denning, Mike Godwin, William A. Bayse, Marc Rotenberg, Lewis M. Branscomb, Anne M. Branscomb, Ronald L. Rivest, Andrew Grosso, Gary T. Marx:
To Tap or not to Tap. Commun. ACM 36(3): 24-44 (1993) - [c20]Dorothy E. Denning:
A new paradigm for trusted systems. NSPW 1993: 36-41 - [e1]Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, Victoria Ashby:
CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993. ACM 1993, ISBN 0-89791-629-8 [contents] - 1992
- [c19]Dorothy E. Denning, James Bidzos, David Bellin, John Gilmore, Whitfield Diffie, John Perry Barlow:
Who holds the keys? CFP 1992: 133-147 - 1991
- [j23]Dorothy E. Denning:
The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking. Commun. ACM 34(3): 22-43 (1991) - 1990
- [j22]Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark R. Heckman, William R. Shockley:
The SeaView Security Model. IEEE Trans. Software Eng. 16(6): 593-607 (1990)
1980 – 1989
- 1988
- [j21]Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark R. Heckman, William R. Shockley:
Element-level classification with A1 assurance. Comput. Secur. 7(1): 73-82 (1988) - [c18]Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark R. Heckman:
The SeaView security model. S&P 1988: 218-233 - 1987
- [j20]Dorothy E. Denning, Selim G. Akl, Mark R. Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell:
Views for Multilevel Database Security. IEEE Trans. Software Eng. 13(2): 129-140 (1987) - [j19]Dorothy E. Denning:
An Intrusion-Detection Model. IEEE Trans. Software Eng. 13(2): 222-232 (1987) - [c17]Dorothy E. Denning:
Lessons Learned from Modeling a Secure Multilevel Relational Database System. DBSec 1987: 35-43 - [c16]Selim G. Akl, Dorothy E. Denning:
Checking Classification Constraints for Consistency and Completeness. S&P 1987: 196-201 - [c15]Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark R. Heckman, William R. Shockley:
A Multilevel Relational Data Model. S&P 1987: 220-234 - 1986
- [c14]Dorothy E. Denning:
An Intrusion-Detection Model. S&P 1986: 118-133 - [c13]Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark R. Heckman:
Views for Multilevel Database Security. S&P 1986: 156-172 - 1985
- [c12]Dorothy E. Denning:
Commutative Filters for Reducing Inference Threats in Multilevel Database Systems. S&P 1985: 134-146 - 1984
- [j18]Dorothy E. Denning:
Digital Signatures with RSA and Other Public-Key Cryptosystems. Commun. ACM 27(4): 388-392 (1984) - [j17]Dorothy E. Denning, Wesley Nicholson, Gordon Sande, Arie Shoshani:
Research Topics in Statistical Database Management. IEEE Database Eng. Bull. 7(1): 4-9 (1984) - [c11]Dorothy E. Denning:
Cryptographic Checksums for Multilevel Database Security. S&P 1984: 52-61 - 1983
- [j16]Dorothy E. Denning:
Protecting Public Keys and Signature Keys. Computer 16(2): 27-35 (1983) - [j15]Dorothy E. Denning, Jan Schlörer:
Inference Controls for Statistical Databases. Computer 16(7): 69-82 (1983) - [c10]Dorothy E. Denning:
Field Encryption and Authentication. CRYPTO 1983: 231-247 - [c9]Dorothy E. Denning:
The Many-Time Pad: Theme and Variations. S&P 1983: 23-32 - [c8]Dorothy E. Denning, Wesley Nicholson, Gordon Sande, Arie Shoshani:
Research Topics in Statistical Database Management. SSDBM 1983: 46-51 - [c7]Dorothy E. Denning:
A Security Model for the Statistical Database Problem. SSDBM 1983: 368-390 - 1982
- [b2]Dorothy E. Denning:
Cryptography and Data Security. Addison-Wesley 1982 - [j14]Dorothy E. Denning:
Review of "Verifying security" by M. H. Cheheyl, M. Gasser, G. A. Huff, and J. K. Millen. Computing Surveys 13, 3 (September 1981). ACM SIGSOFT Softw. Eng. Notes 7(1): 80-81 (1982) - [c6]Dorothy E. Denning, Jan Schlörer, Elisabeth Wehrle:
Memoryless Inference Controls for Statistical Databases. S&P 1982: 38-45 - 1981
- [j13]Dorothy E. Denning, Giovanni Maria Sacco:
Timestamps in Key Distribution Protocols. Commun. ACM 24(8): 533-536 (1981) - [j12]Dorothy E. Denning, Fred B. Schneider:
Master Keys for Group Sharing. Inf. Process. Lett. 12(1): 23-25 (1981) - [j11]Dorothy E. Denning, Henk Meijer, Fred B. Schneider:
More on Master Keys for Group Sharing. Inf. Process. Lett. 13(3): 125-126 (1981) - [c5]Dorothy E. Denning:
Restriciting Queries that Might Lead to Compromise. S&P 1981: 33-40 - 1980
- [j10]Dorothy E. Denning:
Embellishments to the note on information flow into arrays. ACM SIGSOFT Softw. Eng. Notes 5(2): 15-16 (1980) - [j9]Dorothy E. Denning, Jan Schlörer:
A Fast Procedure for Finding a Tracker in a Statistical Database. ACM Trans. Database Syst. 5(1): 88-102 (1980) - [j8]Dorothy E. Denning:
Secure Statistical Databases with Random Sample Queries. ACM Trans. Database Syst. 5(3): 291-315 (1980) - [j7]Dorothy E. Denning:
Corrigenda: Linear Queries in Statistical Databases. ACM Trans. Database Syst. 5(3): 383 (1980) - [c4]Dorothy E. Denning, Fred B. Schneider:
The Master Key Problem. S&P 1980: 103-107
1970 – 1979
- 1979
- [j6]Dorothy E. Denning:
Secure Personal Computing in an Insecure Network. Commun. ACM 22(8): 476-482 (1979) - [j5]Dorothy E. Denning, Peter J. Denning:
Data Security. ACM Comput. Surv. 11(3): 227-249 (1979) - [j4]Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz:
The Tracker: A Threat to Statistical Database Security. ACM Trans. Database Syst. 4(1): 76-96 (1979) - [j3]Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning:
Linear Queries in Statistical Databases. ACM Trans. Database Syst. 4(2): 156-167 (1979) - 1978
- [c3]Dorothy E. Denning:
Are statistical databases secure? AFIPS National Computer Conference 1978: 525-530 - [c2]Dorothy E. Denning:
A method for maintaining routing data in automated record keeping systems. COMPSAC 1978: 215-219 - 1977
- [j2]Dorothy E. Denning, Peter J. Denning:
Certification of Programs for Secure Information Flow. Commun. ACM 20(7): 504-513 (1977) - [c1]Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning:
Securing Data Bases under Linear Queries. IFIP Congress 1977: 395-398 - 1976
- [j1]Dorothy E. Denning:
A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243 (1976) - 1975
- [b1]Dorothy E. Denning:
Secure information flow in computer systems. Purdue University, USA, 1975
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint