Follow
Dorothy Denning
Dorothy Denning
Professor of Defense Analysis, Naval Postgraduate School
Verified email at nps.edu - Homepage
Title
Cited by
Cited by
Year
An intrusion-detection model
DE Denning
IEEE Transactions on software engineering, 222-232, 1987
63011987
Cryptography and data security
DER Denning
Addison-Wesley, 1982
34951982
A lattice model of secure information flow
DE Denning
Communications of the ACM 19 (5), 236-243, 1976
29231976
Certification of programs for secure information flow
DE Denning, PJ Denning
Communications of the ACM 20 (7), 504-513, 1977
15641977
Timestamps in key distribution protocols
DE Denning, GM Sacco
Communications of the ACM 24 (8), 533-536, 1981
13061981
Information warfare and security
DER Denning
Addison-Wesley, 1999
12091999
Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy
DE Denning
Networks and netwars: The future of terror, crime, and militancy 239, 288, 2001
8942001
Method and apparatus for authenticating the location of remote users of networked computing systems
PF MacDoran, MB Mathews, FA Ziel, KL Gold, SM Anderson, MA Coffey, ...
US Patent 5,757,916, 1998
5231998
The SeaView security model
TF Lunt, DE Denning, RR Schell, M Heckman, WR Shockley
IEEE Transactions on software engineering 16 (6), 593-607, 1990
4821990
Cyberterrorism: Testimony before the special oversight panel on terrorism committee on armed services US House of Representatives
DE Denning
Focus on terrorism 9 (1), 71-76, 2000
421*2000
Location-based authentication: Grounding cyberspace for better security
DE Denning, PF MacDoran
Computer Fraud & Security 1996 (2), 12-16, 1996
3641996
Requirements and model for IDES-a real-time intrusion-detection expert system
D Denning, PG Neumann
SRI International, 1985
3491985
The tracker: A threat to statistical database security
DE Denning, PJ Denning
ACM Transactions on Database Systems (TODS) 4 (1), 76-96, 1979
3401979
Data security
DE Denning, PJ Denning
ACM computing surveys (CSUR) 11 (3), 227-249, 1979
3331979
Secure statistical databases with random sample queries
DE Denning
ACM Transactions on Database Systems (TODS) 5 (3), 291-315, 1980
3061980
System and method for delivering encrypted information in a communication network using location identity and key tables
DE Denning, BJ Glick, RS Karpf, ME Seiler
US Patent 7,143,289, 2006
3042006
A taxonomy for key escrow encryption systems
DE Denning, DK Branstad
Communications of the ACM 39 (3), 34-40, 1996
2941996
A multilevel relational data model
DE Denning, TF Lunt
1987 IEEE Symposium on Security and Privacy, 220-220, 1987
2621987
Views for multilevel database security
DE Denning, SG Akl, M Heckman, TF Lunt, M Morgenstern, PG Neumann, ...
IEEE Transactions on Software Engineering, 129-140, 1987
2251987
Honeyfiles: deceptive files for intrusion detection
J Yuill, M Zappe, D Denning, F Feer
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
2152004
The system can't perform the operation now. Try again later.
Articles 1–20