Search the dblp DataBase
Dorothy E. Denning :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dorothy E. Denning , Peter J. Denning , Mayer D. Schwartz The Tracker: A Threat to Statistical Database Security. [Citation Graph (29, 10)][DBLP ] ACM Trans. Database Syst., 1979, v:4, n:1, pp:76-96 [Journal ] Dorothy E. Denning Secure Statistical Databases with Random Sample Queries. [Citation Graph (21, 12)][DBLP ] ACM Trans. Database Syst., 1980, v:5, n:3, pp:291-315 [Journal ] Dorothy E. Denning , Jan Schlörer Inference Controls for Statistical Databases. [Citation Graph (15, 0)][DBLP ] IEEE Computer, 1983, v:16, n:7, pp:69-82 [Journal ] Teresa F. Lunt , Dorothy E. Denning , Roger R. Schell , Mark Heckman , William R. Shockley The SeaView Security Model. [Citation Graph (14, 0)][DBLP ] IEEE Trans. Software Eng., 1990, v:16, n:6, pp:593-607 [Journal ] Dorothy E. Denning A Lattice Model of Secure Information Flow. [Citation Graph (13, 0)][DBLP ] Commun. ACM, 1976, v:19, n:5, pp:236-243 [Journal ] Dorothy E. Denning , Jan Schlörer A Fast Procedure for Finding a Tracker in a Statistical Database. [Citation Graph (13, 7)][DBLP ] ACM Trans. Database Syst., 1980, v:5, n:1, pp:88-102 [Journal ] Mayer D. Schwartz , Dorothy E. Denning , Peter J. Denning Linear Queries in Statistical Databases. [Citation Graph (12, 6)][DBLP ] ACM Trans. Database Syst., 1979, v:4, n:2, pp:156-167 [Journal ] Dorothy E. Denning , Peter J. Denning Data Security. [Citation Graph (7, 0)][DBLP ] ACM Comput. Surv., 1979, v:11, n:3, pp:227-249 [Journal ] Dorothy E. Denning , Selim G. Akl , Mark Heckman , Teresa F. Lunt , Matthew Morgenstern , Peter G. Neumann , Roger R. Schell Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal ] Dorothy E. Denning A Security Model for the Statistical Database Problem. [Citation Graph (4, 17)][DBLP ] SSDBM, 1983, pp:368-390 [Conf ] Dorothy E. Denning , Wesley Nicholson , Gordon Sande , Arie Shoshani Research Topics in Statistical Database Management. [Citation Graph (3, 3)][DBLP ] SSDBM, 1983, pp:46-51 [Conf ] Dorothy E. Denning Field Encryption and Authentication. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1983, pp:231-247 [Conf ] Selim G. Akl , Dorothy E. Denning Checking Classification Constraints for Consistency and Completeness. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:196-201 [Conf ] Dorothy E. Denning The Many-Time Pad: Theme and Variations. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1983, pp:23-32 [Conf ] Dorothy E. Denning , Jan Schlörer , Elisabeth Wehrle Memoryless Inference Controls for Statistical Databases. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1982, pp:38-45 [Conf ] Dorothy E. Denning , Peter J. Denning Certification of Programs for Secure Information Flow. [Citation Graph (1, 0)][DBLP ] Commun. ACM, 1977, v:20, n:7, pp:504-513 [Journal ] Dorothy E. Denning , Wesley Nicholson , Gordon Sande , Arie Shoshani Research Topics in Statistical Database Management. [Citation Graph (1, 0)][DBLP ] IEEE Database Eng. Bull., 1984, v:7, n:1, pp:4-9 [Journal ] Dorothy E. Denning An Intrusion-Detection Model. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:222-232 [Journal ] Dorothy E. Denning Lessons Learned from Modeling a Secure Multilevel Relational Database System. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:35-43 [Conf ] Mayer D. Schwartz , Dorothy E. Denning , Peter J. Denning Securing Data Bases under Linear Queries. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1977, pp:395-398 [Conf ] Dorothy E. Denning Cyber Security as an Emergent Infrastructure. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:1-2 [Conf ] Dorothy E. Denning Cryptographic Checksums for Multilevel Database Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1984, pp:52-61 [Conf ] Dorothy E. Denning An Intrusion-Detection Model. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:118-133 [Conf ] Dorothy E. Denning , Selim G. Akl , Matthew Morgenstern , Peter G. Neumann , Roger R. Schell , Mark Heckman Views for Multilevel Database Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:156-172 [Conf ] Dorothy E. Denning , Teresa F. Lunt , Roger R. Schell , Mark Heckman , William R. Shockley A Multilevel Relational Data Model. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:220-234 [Conf ] Dorothy E. Denning , Fred B. Schneider The Master Key Problem. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1980, pp:103-107 [Conf ] Dorothy E. Denning Secure Personal Computing in an Insecure Network. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1979, v:22, n:8, pp:476-482 [Journal ] Dorothy E. Denning Digital Signatures with RSA and Other Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1984, v:27, n:4, pp:388-392 [Journal ] Dorothy E. Denning The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1991, v:34, n:3, pp:22-43 [Journal ] Dorothy E. Denning , Dennis K. Branstad A Taxonomy for Key Escrow Encryption Systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:34-40 [Journal ] Peter J. Denning , Dorothy E. Denning Artificial stupidity. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:5, pp:112- [Journal ] Dorothy E. Denning , Mike Godwin , William A. Bayse , Marc Rotenberg , Lewis M. Branscomb , Anne M. Branscomb , Ronald L. Rivest , Andrew Grosso , Gary T. Marx To Tap or not to Tap. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:3, pp:24-44 [Journal ] Dorothy E. Denning , Giovanni Maria Sacco Timestamps in Key Distribution Protocols. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1981, v:24, n:8, pp:533-536 [Journal ] Susan Landau , Stephen T. Kent , Clint Brooks , Scott Charney , Dorothy E. Denning , Whitfield Diffie , Anthony Lauck , Douglas Miller , Peter G. Neumann , David Sobel Crypto Policy Perspectives. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:8, pp:115-121 [Journal ] Jeffrey G. Long , Dorothy E. Denning Ultra-Structure: A Design Theory for Complex Systems and Processes. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1995, v:38, n:1, pp:103-120 [Journal ] Dorothy E. Denning The US key escrow encryption technology. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:7, pp:453-457 [Journal ] Dorothy E. Denning , Henk Meijer , Fred B. Schneider More on Master Keys for Group Sharing. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1981, v:13, n:3, pp:125-126 [Journal ] Dorothy E. Denning , Fred B. Schneider Master Keys for Group Sharing. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1981, v:12, n:1, pp:23-25 [Journal ] Dorothy E. Denning Corrigenda: Linear Queries in Statistical Databases. [Citation Graph (0, 1)][DBLP ] ACM Trans. Database Syst., 1980, v:5, n:3, pp:383- [Journal ] Search in 0.391secs, Finished in 0.393secs