| 2004 |
| 40 | EE | Peter J. Denning,
Dorothy E. Denning:
Artificial stupidity.
Commun. ACM 47(5): 112 (2004) |
| 2003 |
| 39 | | Dorothy E. Denning:
Cyber Security as an Emergent Infrastructure.
World Conference on Information Security Education 2003: 1-2 |
| 1996 |
| 38 | | Dorothy E. Denning,
Dennis K. Branstad:
A Taxonomy for Key Escrow Encryption Systems.
Commun. ACM 39(3): 34-40 (1996) |
| 1995 |
| 37 | | Jeffrey G. Long,
Dorothy E. Denning:
Ultra-Structure: A Design Theory for Complex Systems and Processes.
Commun. ACM 38(1): 103-120 (1995) |
| 1994 |
| 36 | | Susan Landau,
Stephen T. Kent,
Clint Brooks,
Scott Charney,
Dorothy E. Denning,
Whitfield Diffie,
Anthony Lauck,
Douglas Miller,
Peter G. Neumann,
David Sobel:
Crypto Policy Perspectives.
Commun. ACM 37(8): 115-121 (1994) |
| 35 | EE | Dorothy E. Denning:
The US key escrow encryption technology.
Computer Communications 17(7): 453-457 (1994) |
| 1993 |
| 34 | | Dorothy E. Denning,
Mike Godwin,
William A. Bayse,
Marc Rotenberg,
Lewis M. Branscomb,
Anne M. Branscomb,
Ronald L. Rivest,
Andrew Grosso,
Gary T. Marx:
To Tap or not to Tap.
Commun. ACM 36(3): 24-44 (1993) |
| 1991 |
| 33 | | Dorothy E. Denning:
The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking.
Commun. ACM 34(3): 22-43 (1991) |
| 1990 |
| 32 | EE | Teresa F. Lunt,
Dorothy E. Denning,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
The SeaView Security Model.
IEEE Trans. Software Eng. 16(6): 593-607 (1990) |
| 1987 |
| 31 | | Dorothy E. Denning:
Lessons Learned from Modeling a Secure Multilevel Relational Database System.
DBSec 1987: 35-43 |
| 30 | | Selim G. Akl,
Dorothy E. Denning:
Checking Classification Constraints for Consistency and Completeness.
IEEE Symposium on Security and Privacy 1987: 196-201 |
| 29 | | Dorothy E. Denning,
Teresa F. Lunt,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
A Multilevel Relational Data Model.
IEEE Symposium on Security and Privacy 1987: 220-234 |
| 28 | | Dorothy E. Denning,
Selim G. Akl,
Mark Heckman,
Teresa F. Lunt,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell:
Views for Multilevel Database Security.
IEEE Trans. Software Eng. 13(2): 129-140 (1987) |
| 27 | | Dorothy E. Denning:
An Intrusion-Detection Model.
IEEE Trans. Software Eng. 13(2): 222-232 (1987) |
| 1986 |
| 26 | | Dorothy E. Denning:
An Intrusion-Detection Model.
IEEE Symposium on Security and Privacy 1986: 118-133 |
| 25 | | Dorothy E. Denning,
Selim G. Akl,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell,
Mark Heckman:
Views for Multilevel Database Security.
IEEE Symposium on Security and Privacy 1986: 156-172 |
| 1984 |
| 24 | | Dorothy E. Denning:
Cryptographic Checksums for Multilevel Database Security.
IEEE Symposium on Security and Privacy 1984: 52-61 |
| 23 | | Dorothy E. Denning:
Digital Signatures with RSA and Other Public-Key Cryptosystems.
Commun. ACM 27(4): 388-392 (1984) |
| 22 | EE | Dorothy E. Denning,
Wesley Nicholson,
Gordon Sande,
Arie Shoshani:
Research Topics in Statistical Database Management.
IEEE Database Eng. Bull. 7(1): 4-9 (1984) |
| 1983 |
| 21 | | Dorothy E. Denning:
Field Encryption and Authentication.
CRYPTO 1983: 231-247 |
| 20 | | Dorothy E. Denning:
The Many-Time Pad: Theme and Variations.
IEEE Symposium on Security and Privacy 1983: 23-32 |
| 19 | EE | Dorothy E. Denning:
A Security Model for the Statistical Database Problem.
SSDBM 1983: 368-390 |
| 18 | EE | Dorothy E. Denning,
Wesley Nicholson,
Gordon Sande,
Arie Shoshani:
Research Topics in Statistical Database Management.
SSDBM 1983: 46-51 |
| 17 | | Dorothy E. Denning,
Jan Schlörer:
Inference Controls for Statistical Databases.
IEEE Computer 16(7): 69-82 (1983) |
| 1982 |
| 16 | | Dorothy E. Denning:
Cryptography and Data Security
Addison-Wesley 1982 |
| 15 | | Dorothy E. Denning,
Jan Schlörer,
Elisabeth Wehrle:
Memoryless Inference Controls for Statistical Databases.
IEEE Symposium on Security and Privacy 1982: 38-45 |
| 1981 |
| 14 | | Dorothy E. Denning,
Giovanni Maria Sacco:
Timestamps in Key Distribution Protocols.
Commun. ACM 24(8): 533-536 (1981) |
| 13 | | Dorothy E. Denning,
Fred B. Schneider:
Master Keys for Group Sharing.
Inf. Process. Lett. 12(1): 23-25 (1981) |
| 12 | | Dorothy E. Denning,
Henk Meijer,
Fred B. Schneider:
More on Master Keys for Group Sharing.
Inf. Process. Lett. 13(3): 125-126 (1981) |
| 1980 |
| 11 | | Dorothy E. Denning,
Fred B. Schneider:
The Master Key Problem.
IEEE Symposium on Security and Privacy 1980: 103-107 |
| 10 | EE | Dorothy E. Denning,
Jan Schlörer:
A Fast Procedure for Finding a Tracker in a Statistical Database.
ACM Trans. Database Syst. 5(1): 88-102 (1980) |
| 9 | EE | Dorothy E. Denning:
Secure Statistical Databases with Random Sample Queries.
ACM Trans. Database Syst. 5(3): 291-315 (1980) |
| 8 | EE | Dorothy E. Denning:
Corrigenda: Linear Queries in Statistical Databases.
ACM Trans. Database Syst. 5(3): 383 (1980) |
| 1979 |
| 7 | | Dorothy E. Denning,
Peter J. Denning:
Data Security.
ACM Comput. Surv. 11(3): 227-249 (1979) |
| 6 | EE | Dorothy E. Denning,
Peter J. Denning,
Mayer D. Schwartz:
The Tracker: A Threat to Statistical Database Security.
ACM Trans. Database Syst. 4(1): 76-96 (1979) |
| 5 | EE | Mayer D. Schwartz,
Dorothy E. Denning,
Peter J. Denning:
Linear Queries in Statistical Databases.
ACM Trans. Database Syst. 4(2): 156-167 (1979) |
| 4 | | Dorothy E. Denning:
Secure Personal Computing in an Insecure Network.
Commun. ACM 22(8): 476-482 (1979) |
| 1977 |
| 3 | | Mayer D. Schwartz,
Dorothy E. Denning,
Peter J. Denning:
Securing Data Bases under Linear Queries.
IFIP Congress 1977: 395-398 |
| 2 | | Dorothy E. Denning,
Peter J. Denning:
Certification of Programs for Secure Information Flow.
Commun. ACM 20(7): 504-513 (1977) |
| 1976 |
| 1 | | Dorothy E. Denning:
A Lattice Model of Secure Information Flow.
Commun. ACM 19(5): 236-243 (1976) |