2004 |
40 | EE | Peter J. Denning,
Dorothy E. Denning:
Artificial stupidity.
Commun. ACM 47(5): 112 (2004) |
2003 |
39 | | Dorothy E. Denning:
Cyber Security as an Emergent Infrastructure.
World Conference on Information Security Education 2003: 1-2 |
1996 |
38 | | Dorothy E. Denning,
Dennis K. Branstad:
A Taxonomy for Key Escrow Encryption Systems.
Commun. ACM 39(3): 34-40 (1996) |
1995 |
37 | | Jeffrey G. Long,
Dorothy E. Denning:
Ultra-Structure: A Design Theory for Complex Systems and Processes.
Commun. ACM 38(1): 103-120 (1995) |
1994 |
36 | | Susan Landau,
Stephen T. Kent,
Clint Brooks,
Scott Charney,
Dorothy E. Denning,
Whitfield Diffie,
Anthony Lauck,
Douglas Miller,
Peter G. Neumann,
David Sobel:
Crypto Policy Perspectives.
Commun. ACM 37(8): 115-121 (1994) |
35 | EE | Dorothy E. Denning:
The US key escrow encryption technology.
Computer Communications 17(7): 453-457 (1994) |
1993 |
34 | | Dorothy E. Denning,
Mike Godwin,
William A. Bayse,
Marc Rotenberg,
Lewis M. Branscomb,
Anne M. Branscomb,
Ronald L. Rivest,
Andrew Grosso,
Gary T. Marx:
To Tap or not to Tap.
Commun. ACM 36(3): 24-44 (1993) |
1991 |
33 | | Dorothy E. Denning:
The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking.
Commun. ACM 34(3): 22-43 (1991) |
1990 |
32 | EE | Teresa F. Lunt,
Dorothy E. Denning,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
The SeaView Security Model.
IEEE Trans. Software Eng. 16(6): 593-607 (1990) |
1987 |
31 | | Dorothy E. Denning:
Lessons Learned from Modeling a Secure Multilevel Relational Database System.
DBSec 1987: 35-43 |
30 | | Selim G. Akl,
Dorothy E. Denning:
Checking Classification Constraints for Consistency and Completeness.
IEEE Symposium on Security and Privacy 1987: 196-201 |
29 | | Dorothy E. Denning,
Teresa F. Lunt,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
A Multilevel Relational Data Model.
IEEE Symposium on Security and Privacy 1987: 220-234 |
28 | | Dorothy E. Denning,
Selim G. Akl,
Mark Heckman,
Teresa F. Lunt,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell:
Views for Multilevel Database Security.
IEEE Trans. Software Eng. 13(2): 129-140 (1987) |
27 | | Dorothy E. Denning:
An Intrusion-Detection Model.
IEEE Trans. Software Eng. 13(2): 222-232 (1987) |
1986 |
26 | | Dorothy E. Denning:
An Intrusion-Detection Model.
IEEE Symposium on Security and Privacy 1986: 118-133 |
25 | | Dorothy E. Denning,
Selim G. Akl,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell,
Mark Heckman:
Views for Multilevel Database Security.
IEEE Symposium on Security and Privacy 1986: 156-172 |
1984 |
24 | | Dorothy E. Denning:
Cryptographic Checksums for Multilevel Database Security.
IEEE Symposium on Security and Privacy 1984: 52-61 |
23 | | Dorothy E. Denning:
Digital Signatures with RSA and Other Public-Key Cryptosystems.
Commun. ACM 27(4): 388-392 (1984) |
22 | EE | Dorothy E. Denning,
Wesley Nicholson,
Gordon Sande,
Arie Shoshani:
Research Topics in Statistical Database Management.
IEEE Database Eng. Bull. 7(1): 4-9 (1984) |
1983 |
21 | | Dorothy E. Denning:
Field Encryption and Authentication.
CRYPTO 1983: 231-247 |
20 | | Dorothy E. Denning:
The Many-Time Pad: Theme and Variations.
IEEE Symposium on Security and Privacy 1983: 23-32 |
19 | EE | Dorothy E. Denning:
A Security Model for the Statistical Database Problem.
SSDBM 1983: 368-390 |
18 | EE | Dorothy E. Denning,
Wesley Nicholson,
Gordon Sande,
Arie Shoshani:
Research Topics in Statistical Database Management.
SSDBM 1983: 46-51 |
17 | | Dorothy E. Denning,
Jan Schlörer:
Inference Controls for Statistical Databases.
IEEE Computer 16(7): 69-82 (1983) |
1982 |
16 | | Dorothy E. Denning:
Cryptography and Data Security
Addison-Wesley 1982 |
15 | | Dorothy E. Denning,
Jan Schlörer,
Elisabeth Wehrle:
Memoryless Inference Controls for Statistical Databases.
IEEE Symposium on Security and Privacy 1982: 38-45 |
1981 |
14 | | Dorothy E. Denning,
Giovanni Maria Sacco:
Timestamps in Key Distribution Protocols.
Commun. ACM 24(8): 533-536 (1981) |
13 | | Dorothy E. Denning,
Fred B. Schneider:
Master Keys for Group Sharing.
Inf. Process. Lett. 12(1): 23-25 (1981) |
12 | | Dorothy E. Denning,
Henk Meijer,
Fred B. Schneider:
More on Master Keys for Group Sharing.
Inf. Process. Lett. 13(3): 125-126 (1981) |
1980 |
11 | | Dorothy E. Denning,
Fred B. Schneider:
The Master Key Problem.
IEEE Symposium on Security and Privacy 1980: 103-107 |
10 | EE | Dorothy E. Denning,
Jan Schlörer:
A Fast Procedure for Finding a Tracker in a Statistical Database.
ACM Trans. Database Syst. 5(1): 88-102 (1980) |
9 | EE | Dorothy E. Denning:
Secure Statistical Databases with Random Sample Queries.
ACM Trans. Database Syst. 5(3): 291-315 (1980) |
8 | EE | Dorothy E. Denning:
Corrigenda: Linear Queries in Statistical Databases.
ACM Trans. Database Syst. 5(3): 383 (1980) |
1979 |
7 | | Dorothy E. Denning,
Peter J. Denning:
Data Security.
ACM Comput. Surv. 11(3): 227-249 (1979) |
6 | EE | Dorothy E. Denning,
Peter J. Denning,
Mayer D. Schwartz:
The Tracker: A Threat to Statistical Database Security.
ACM Trans. Database Syst. 4(1): 76-96 (1979) |
5 | EE | Mayer D. Schwartz,
Dorothy E. Denning,
Peter J. Denning:
Linear Queries in Statistical Databases.
ACM Trans. Database Syst. 4(2): 156-167 (1979) |
4 | | Dorothy E. Denning:
Secure Personal Computing in an Insecure Network.
Commun. ACM 22(8): 476-482 (1979) |
1977 |
3 | | Mayer D. Schwartz,
Dorothy E. Denning,
Peter J. Denning:
Securing Data Bases under Linear Queries.
IFIP Congress 1977: 395-398 |
2 | | Dorothy E. Denning,
Peter J. Denning:
Certification of Programs for Secure Information Flow.
Commun. ACM 20(7): 504-513 (1977) |
1976 |
1 | | Dorothy E. Denning:
A Lattice Model of Secure Information Flow.
Commun. ACM 19(5): 236-243 (1976) |