dblp.uni-trier.dewww.uni-trier.de

Dorothy E. Denning

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2004
40EEPeter J. Denning, Dorothy E. Denning: Artificial stupidity. Commun. ACM 47(5): 112 (2004)
2003
39 Dorothy E. Denning: Cyber Security as an Emergent Infrastructure. World Conference on Information Security Education 2003: 1-2
1996
38 Dorothy E. Denning, Dennis K. Branstad: A Taxonomy for Key Escrow Encryption Systems. Commun. ACM 39(3): 34-40 (1996)
1995
37 Jeffrey G. Long, Dorothy E. Denning: Ultra-Structure: A Design Theory for Complex Systems and Processes. Commun. ACM 38(1): 103-120 (1995)
1994
36 Susan Landau, Stephen T. Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel: Crypto Policy Perspectives. Commun. ACM 37(8): 115-121 (1994)
35EEDorothy E. Denning: The US key escrow encryption technology. Computer Communications 17(7): 453-457 (1994)
1993
34 Dorothy E. Denning, Mike Godwin, William A. Bayse, Marc Rotenberg, Lewis M. Branscomb, Anne M. Branscomb, Ronald L. Rivest, Andrew Grosso, Gary T. Marx: To Tap or not to Tap. Commun. ACM 36(3): 24-44 (1993)
1991
33 Dorothy E. Denning: The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking. Commun. ACM 34(3): 22-43 (1991)
1990
32EETeresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley: The SeaView Security Model. IEEE Trans. Software Eng. 16(6): 593-607 (1990)
1987
31 Dorothy E. Denning: Lessons Learned from Modeling a Secure Multilevel Relational Database System. DBSec 1987: 35-43
30 Selim G. Akl, Dorothy E. Denning: Checking Classification Constraints for Consistency and Completeness. IEEE Symposium on Security and Privacy 1987: 196-201
29 Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark Heckman, William R. Shockley: A Multilevel Relational Data Model. IEEE Symposium on Security and Privacy 1987: 220-234
28 Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell: Views for Multilevel Database Security. IEEE Trans. Software Eng. 13(2): 129-140 (1987)
27 Dorothy E. Denning: An Intrusion-Detection Model. IEEE Trans. Software Eng. 13(2): 222-232 (1987)
1986
26 Dorothy E. Denning: An Intrusion-Detection Model. IEEE Symposium on Security and Privacy 1986: 118-133
25 Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman: Views for Multilevel Database Security. IEEE Symposium on Security and Privacy 1986: 156-172
1984
24 Dorothy E. Denning: Cryptographic Checksums for Multilevel Database Security. IEEE Symposium on Security and Privacy 1984: 52-61
23 Dorothy E. Denning: Digital Signatures with RSA and Other Public-Key Cryptosystems. Commun. ACM 27(4): 388-392 (1984)
22EEDorothy E. Denning, Wesley Nicholson, Gordon Sande, Arie Shoshani: Research Topics in Statistical Database Management. IEEE Database Eng. Bull. 7(1): 4-9 (1984)
1983
21 Dorothy E. Denning: Field Encryption and Authentication. CRYPTO 1983: 231-247
20 Dorothy E. Denning: The Many-Time Pad: Theme and Variations. IEEE Symposium on Security and Privacy 1983: 23-32
19EEDorothy E. Denning: A Security Model for the Statistical Database Problem. SSDBM 1983: 368-390
18EEDorothy E. Denning, Wesley Nicholson, Gordon Sande, Arie Shoshani: Research Topics in Statistical Database Management. SSDBM 1983: 46-51
17 Dorothy E. Denning, Jan Schlörer: Inference Controls for Statistical Databases. IEEE Computer 16(7): 69-82 (1983)
1982
16 Dorothy E. Denning: Cryptography and Data Security Addison-Wesley 1982
15 Dorothy E. Denning, Jan Schlörer, Elisabeth Wehrle: Memoryless Inference Controls for Statistical Databases. IEEE Symposium on Security and Privacy 1982: 38-45
1981
14 Dorothy E. Denning, Giovanni Maria Sacco: Timestamps in Key Distribution Protocols. Commun. ACM 24(8): 533-536 (1981)
13 Dorothy E. Denning, Fred B. Schneider: Master Keys for Group Sharing. Inf. Process. Lett. 12(1): 23-25 (1981)
12 Dorothy E. Denning, Henk Meijer, Fred B. Schneider: More on Master Keys for Group Sharing. Inf. Process. Lett. 13(3): 125-126 (1981)
1980
11 Dorothy E. Denning, Fred B. Schneider: The Master Key Problem. IEEE Symposium on Security and Privacy 1980: 103-107
10EEDorothy E. Denning, Jan Schlörer: A Fast Procedure for Finding a Tracker in a Statistical Database. ACM Trans. Database Syst. 5(1): 88-102 (1980)
9EEDorothy E. Denning: Secure Statistical Databases with Random Sample Queries. ACM Trans. Database Syst. 5(3): 291-315 (1980)
8EEDorothy E. Denning: Corrigenda: Linear Queries in Statistical Databases. ACM Trans. Database Syst. 5(3): 383 (1980)
1979
7 Dorothy E. Denning, Peter J. Denning: Data Security. ACM Comput. Surv. 11(3): 227-249 (1979)
6EEDorothy E. Denning, Peter J. Denning, Mayer D. Schwartz: The Tracker: A Threat to Statistical Database Security. ACM Trans. Database Syst. 4(1): 76-96 (1979)
5EEMayer D. Schwartz, Dorothy E. Denning, Peter J. Denning: Linear Queries in Statistical Databases. ACM Trans. Database Syst. 4(2): 156-167 (1979)
4 Dorothy E. Denning: Secure Personal Computing in an Insecure Network. Commun. ACM 22(8): 476-482 (1979)
1977
3 Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning: Securing Data Bases under Linear Queries. IFIP Congress 1977: 395-398
2 Dorothy E. Denning, Peter J. Denning: Certification of Programs for Secure Information Flow. Commun. ACM 20(7): 504-513 (1977)
1976
1 Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243 (1976)

Coauthor Index

1Selim G. Akl [25] [28] [30]
2William A. Bayse [34]
3Anne M. Branscomb [34]
4Lewis M. Branscomb [34]
5Dennis K. Branstad [38]
6Clint Brooks [36]
7Scott Charney [36]
8Peter J. Denning [2] [3] [5] [6] [7] [40]
9Whitfield Diffie [36]
10Mike Godwin [34]
11Andrew Grosso [34]
12Mark Heckman [25] [28] [29] [32]
13Stephen T. Kent [36]
14Susan Landau [36]
15Anthony Lauck [36]
16Jeffrey G. Long [37]
17Teresa F. Lunt [28] [29] [32]
18Gary T. Marx [34]
19Henk Meijer [12]
20Douglas Miller [36]
21Matthew Morgenstern [25] [28]
22Peter G. Neumann [25] [28] [36]
23Wesley Nicholson [18] [22]
24Ronald L. Rivest [34]
25Marc Rotenberg [34]
26Giovanni Maria Sacco [14]
27Gordon Sande [18] [22]
28Roger R. Schell [25] [28] [29] [32]
29Jan Schlörer [10] [15] [17]
30Fred B. Schneider [11] [12] [13]
31Mayer D. Schwartz [3] [5] [6]
32William R. Shockley [29] [32]
33Arie Shoshani [18] [22]
34David Sobel [36]
35Elisabeth Wehrle [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)