Dorothy E. Denning

Affiliations:
  • Naval Postgraduate School, Department of Defense Analysis, Monterey, CA, USA


According to our database1, Dorothy E. Denning authored at least 63 papers between 1976 and 2020.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 1995, "For technical leadership and professional contributions that advanced the field of computer and communications security and promoted the open exchange of ideas and information.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Dilemmas of artificial intelligence.
Commun. ACM, 2020

2015
Toward more secure software.
Commun. ACM, 2015

2014
Framework and principles for active cyber defense.
Comput. Secur., 2014

2012
Stuxnet: What Has Changed?
Future Internet, 2012

2011
Cyberwarfare.
IEEE Secur. Priv., 2011

The Dark Web Forum Portal: From multi-lingual to video.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

2010
Discussing cyber attack.
Commun. ACM, 2010

Developing a Dark Web collection and infrastructure for computational and social sciences.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

2009
Guest Editors' Introduction: Securing the Domain Name System.
IEEE Secur. Priv., 2009

2008
Information Assurance Technology Forecast 2008.
IEEE Secur. Priv., 2008

2004
Artificial stupidity.
Commun. ACM, 2004

2003
Cyber Security as an Emergent Infrastructure.
Proceedings of the Security Education and Critical Infrastructures, 2003

2000
Hacktivism and other net crimes.
Ubiquity, 2000

Information warefare and security.
Addison-Wesley-Longman, ISBN: 978-0-201-43303-6, 2000

1996
Responses to "The consequences of computing".
SIGCAS Comput. Soc., 1996

A Taxonomy for Key Escrow Encryption Systems.
Commun. ACM, 1996

Clipper Chip Will Reinforce Privacy.
Proceedings of the Computerization and Controversy, 2nd Ed., 1996

1995
Ultra-Structure: A Design Theory for Complex Systems and Processes.
Commun. ACM, 1995

1994
The US key escrow encryption technology.
Comput. Commun., 1994

Key escrowing today.
IEEE Commun. Mag., 1994

Crypto Policy Perspectives.
Commun. ACM, 1994

1993
To Tap or not to Tap.
Commun. ACM, 1993

A new paradigm for trusted systems.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993

1992
Who holds the keys?
Proceedings of the Second Conference on Computers, Freedom and Privacy, 1992

1991
The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking.
Commun. ACM, 1991

1990
The SeaView Security Model.
IEEE Trans. Software Eng., 1990

1988
Element-level classification with A1 assurance.
Comput. Secur., 1988

1987
Views for Multilevel Database Security.
IEEE Trans. Software Eng., 1987

An Intrusion-Detection Model.
IEEE Trans. Software Eng., 1987

A Multilevel Relational Data Model.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

Checking Classification Constraints for Consistency and Completeness.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

Lessons Learned from Modeling a Secure Multilevel Relational Database System.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987

1986
Views for Multilevel Database Security.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

1985
Commutative Filters for Reducing Inference Threats in Multilevel Database Systems.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985

1984
Research Topics in Statistical Database Management.
IEEE Database Eng. Bull., 1984

Digital Signatures with RSA and Other Public-Key Cryptosystems.
Commun. ACM, 1984

Cryptographic Checksums for Multilevel Database Security.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

1983
Inference Controls for Statistical Databases.
Computer, 1983

Protecting Public Keys and Signature Keys.
Computer, 1983

A Security Model for the Statistical Database Problem.
Proceedings of the Second International Workshop on Statistical Database Management, 1983

The Many-Time Pad: Theme and Variations.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

Field Encryption and Authentication.
Proceedings of the Advances in Cryptology, 1983

1982
Review of "Verifying security" by M. H. Cheheyl, M. Gasser, G. A. Huff, and J. K. Millen. Computing Surveys 13, 3 (September 1981).
ACM SIGSOFT Softw. Eng. Notes, 1982

Memoryless Inference Controls for Statistical Databases.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982

Cryptography and Data Security
Addison-Wesley, 1982

1981
Master Keys for Group Sharing.
Inf. Process. Lett., 1981

More on Master Keys for Group Sharing.
Inf. Process. Lett., 1981

Timestamps in Key Distribution Protocols.
Commun. ACM, 1981

Restriciting Queries that Might Lead to Compromise.
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981

1980
A Fast Procedure for Finding a Tracker in a Statistical Database.
ACM Trans. Database Syst., 1980

Corrigenda: Linear Queries in Statistical Databases.
ACM Trans. Database Syst., 1980

Secure Statistical Databases with Random Sample Queries.
ACM Trans. Database Syst., 1980

Embellishments to the note on information flow into arrays.
ACM SIGSOFT Softw. Eng. Notes, 1980

The Master Key Problem.
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980

1979
Linear Queries in Statistical Databases.
ACM Trans. Database Syst., 1979

The Tracker: A Threat to Statistical Database Security.
ACM Trans. Database Syst., 1979

Data Security.
ACM Comput. Surv., 1979

Secure Personal Computing in an Insecure Network.
Commun. ACM, 1979

1978
A method for maintaining routing data in automated record keeping systems.
Proceedings of the IEEE Computer Society's Second International Computer Software and Applications Conference, 1978

Are statistical databases secure?
Proceedings of the American Federation of Information Processing Societies: 1978 National Computer Conference, 1978

1977
Certification of Programs for Secure Information Flow.
Commun. ACM, 1977

Securing Data Bases under Linear Queries.
Proceedings of the Information Processing, 1977

1976
A Lattice Model of Secure Information Flow.
Commun. ACM, 1976


  Loading...