The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dorothy E. Denning: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz
    The Tracker: A Threat to Statistical Database Security. [Citation Graph (29, 10)][DBLP]
    ACM Trans. Database Syst., 1979, v:4, n:1, pp:76-96 [Journal]
  2. Dorothy E. Denning
    Secure Statistical Databases with Random Sample Queries. [Citation Graph (21, 12)][DBLP]
    ACM Trans. Database Syst., 1980, v:5, n:3, pp:291-315 [Journal]
  3. Dorothy E. Denning, Jan Schlörer
    Inference Controls for Statistical Databases. [Citation Graph (15, 0)][DBLP]
    IEEE Computer, 1983, v:16, n:7, pp:69-82 [Journal]
  4. Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley
    The SeaView Security Model. [Citation Graph (14, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:6, pp:593-607 [Journal]
  5. Dorothy E. Denning
    A Lattice Model of Secure Information Flow. [Citation Graph (13, 0)][DBLP]
    Commun. ACM, 1976, v:19, n:5, pp:236-243 [Journal]
  6. Dorothy E. Denning, Jan Schlörer
    A Fast Procedure for Finding a Tracker in a Statistical Database. [Citation Graph (13, 7)][DBLP]
    ACM Trans. Database Syst., 1980, v:5, n:1, pp:88-102 [Journal]
  7. Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning
    Linear Queries in Statistical Databases. [Citation Graph (12, 6)][DBLP]
    ACM Trans. Database Syst., 1979, v:4, n:2, pp:156-167 [Journal]
  8. Dorothy E. Denning, Peter J. Denning
    Data Security. [Citation Graph (7, 0)][DBLP]
    ACM Comput. Surv., 1979, v:11, n:3, pp:227-249 [Journal]
  9. Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell
    Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal]
  10. Dorothy E. Denning
    A Security Model for the Statistical Database Problem. [Citation Graph (4, 17)][DBLP]
    SSDBM, 1983, pp:368-390 [Conf]
  11. Dorothy E. Denning, Wesley Nicholson, Gordon Sande, Arie Shoshani
    Research Topics in Statistical Database Management. [Citation Graph (3, 3)][DBLP]
    SSDBM, 1983, pp:46-51 [Conf]
  12. Dorothy E. Denning
    Field Encryption and Authentication. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1983, pp:231-247 [Conf]
  13. Selim G. Akl, Dorothy E. Denning
    Checking Classification Constraints for Consistency and Completeness. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:196-201 [Conf]
  14. Dorothy E. Denning
    The Many-Time Pad: Theme and Variations. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1983, pp:23-32 [Conf]
  15. Dorothy E. Denning, Jan Schlörer, Elisabeth Wehrle
    Memoryless Inference Controls for Statistical Databases. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1982, pp:38-45 [Conf]
  16. Dorothy E. Denning, Peter J. Denning
    Certification of Programs for Secure Information Flow. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1977, v:20, n:7, pp:504-513 [Journal]
  17. Dorothy E. Denning, Wesley Nicholson, Gordon Sande, Arie Shoshani
    Research Topics in Statistical Database Management. [Citation Graph (1, 0)][DBLP]
    IEEE Database Eng. Bull., 1984, v:7, n:1, pp:4-9 [Journal]
  18. Dorothy E. Denning
    An Intrusion-Detection Model. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:222-232 [Journal]
  19. Dorothy E. Denning
    Lessons Learned from Modeling a Secure Multilevel Relational Database System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:35-43 [Conf]
  20. Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning
    Securing Data Bases under Linear Queries. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1977, pp:395-398 [Conf]
  21. Dorothy E. Denning
    Cyber Security as an Emergent Infrastructure. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:1-2 [Conf]
  22. Dorothy E. Denning
    Cryptographic Checksums for Multilevel Database Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:52-61 [Conf]
  23. Dorothy E. Denning
    An Intrusion-Detection Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:118-133 [Conf]
  24. Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman
    Views for Multilevel Database Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:156-172 [Conf]
  25. Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark Heckman, William R. Shockley
    A Multilevel Relational Data Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:220-234 [Conf]
  26. Dorothy E. Denning, Fred B. Schneider
    The Master Key Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:103-107 [Conf]
  27. Dorothy E. Denning
    Secure Personal Computing in an Insecure Network. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1979, v:22, n:8, pp:476-482 [Journal]
  28. Dorothy E. Denning
    Digital Signatures with RSA and Other Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1984, v:27, n:4, pp:388-392 [Journal]
  29. Dorothy E. Denning
    The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1991, v:34, n:3, pp:22-43 [Journal]
  30. Dorothy E. Denning, Dennis K. Branstad
    A Taxonomy for Key Escrow Encryption Systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1996, v:39, n:3, pp:34-40 [Journal]
  31. Peter J. Denning, Dorothy E. Denning
    Artificial stupidity. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:5, pp:112- [Journal]
  32. Dorothy E. Denning, Mike Godwin, William A. Bayse, Marc Rotenberg, Lewis M. Branscomb, Anne M. Branscomb, Ronald L. Rivest, Andrew Grosso, Gary T. Marx
    To Tap or not to Tap. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:3, pp:24-44 [Journal]
  33. Dorothy E. Denning, Giovanni Maria Sacco
    Timestamps in Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1981, v:24, n:8, pp:533-536 [Journal]
  34. Susan Landau, Stephen T. Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel
    Crypto Policy Perspectives. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:8, pp:115-121 [Journal]
  35. Jeffrey G. Long, Dorothy E. Denning
    Ultra-Structure: A Design Theory for Complex Systems and Processes. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:1, pp:103-120 [Journal]
  36. Dorothy E. Denning
    The US key escrow encryption technology. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:453-457 [Journal]
  37. Dorothy E. Denning, Henk Meijer, Fred B. Schneider
    More on Master Keys for Group Sharing. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1981, v:13, n:3, pp:125-126 [Journal]
  38. Dorothy E. Denning, Fred B. Schneider
    Master Keys for Group Sharing. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1981, v:12, n:1, pp:23-25 [Journal]
  39. Dorothy E. Denning
    Corrigenda: Linear Queries in Statistical Databases. [Citation Graph (0, 1)][DBLP]
    ACM Trans. Database Syst., 1980, v:5, n:3, pp:383- [Journal]

Search in 0.026secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002