Dorothy E. Denning
#10,417
Most Influential Person Now
American information security researcher
Dorothy E. Denning's AcademicInfluence.com Rankings
Dorothy E. Denningcomputer-science Degrees
Computer Science
#642
World Rank
#662
Historical Rank
#348
USA Rank
Information Security
#4
World Rank
#4
Historical Rank
#3
USA Rank
Database
#667
World Rank
#699
Historical Rank
#235
USA Rank
Download Badge
Computer Science
Dorothy E. Denning's Degrees
- PhD Computer Science Purdue University
- Masters Computer Science Purdue University
Similar Degrees You Can Earn
Why Is Dorothy E. Denning Influential?
(Suggest an Edit or Addition)According to Wikipedia, Dorothy Elizabeth Denning is a US-American information security researcher known for lattice-based access control , intrusion detection systems , and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.
Dorothy E. Denning's Published Works
Published Works
- An Intrusion-Detection Model (1987) (3069)
- A lattice model of secure information flow (1976) (2030)
- Cryptography and Data Security (1982) (1963)
- Certification of programs for secure information flow (1977) (1161)
- An Intrusion-Detection Model (1986) (843)
- Timestamps in key distribution protocols (1981) (803)
- Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy (2001) (335)
- The SeaView security model (1988) (315)
- Information Warfare And Security (1998) (312)
- Location-based authentication: Grounding cyberspace for better security (1996) (279)
- The tracker: a threat to statistical database security (1979) (225)
- Secure statistical databases with random sample queries (1980) (218)
- A Multilevel Relational Data Model (1987) (202)
- A taxonomy for key escrow encryption systems (1996) (166)
- Data Security (1979) (164)
- Inference Controls for Statistical Databases (1983) (150)
- Honeyfiles: deceptive files for intrusion detection (2004) (142)
- Views for Multilevel Database Security (1987) (133)
- Digital signatures with RSA and other public-key cryptosystems (1984) (113)
- Secure information flow in computer systems. (1975) (109)
- A new paradigm for trusted systems (1993) (98)
- A fast procedure for finding a tracker in a statistical database (1980) (89)
- A Location Based Encryption Technique and Some of Its Applications (2003) (80)
- Cryptographic Checksums for Multilevel Database Security (1984) (77)
- Commutative Filters for Reducing Inference Threats in Multilevel Database Systems (1985) (72)
- Stuxnet: What Has Changed? (2012) (70)
- Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques (2006) (66)
- Views for Multilevel Database Security (1986) (60)
- Key escrowing today (1994) (55)
- Internet Besieged: Countering Cyberspace Scofflaws (1997) (52)
- Framework and principles for active cyber defense (2014) (51)
- HIDING CRIMES IN CYBERSPACE (1999) (47)
- Terror's Web: How the Internet is Transforming Terrorism (2010) (45)
- Geo-Encryption: Using GPS to Enhance Data Security (2003) (42)
- To tap or not to tap (1993) (40)
- Cyber Conflict as an Emergent Social Phenomenon (2011) (40)
- Linear queries in statistical databases (1979) (39)
- Protecting Public Keys and Signature Keys (1983) (37)
- Location Based Encryption and Its Role In Digital Cinema Distribution (2003) (35)
- Field Encryption and Authentication (1983) (32)
- SKIPJACK review: interim report (1995) (32)
- Developing a Dark Web collection and infrastructure for computational and social sciences (2010) (32)
- Ultra-structure: a design theory for complex systems and processes (1995) (29)
- A Security Model for the Statistical Database Problem (1983) (29)
- A View of Cyberterrorism Five Years Later (2006) (28)
- Rethinking the Cyber Domain and Deterrence (2015) (28)
- Secure personal computing in an insecure network (1979) (25)
- The Ethics of Cyber Conflict (2009) (25)
- Memoryless Inference Controls for Statistical Databases (1982) (24)
- Information Operations and Terrorism (2005) (21)
- Encryption and evolving technologies: Tools of organized crime and terrorism (1998) (21)
- Checking Classification Constraints for Consistency and Completeness (1987) (21)
- Rights and Responsibilities of Participants in Networked Communities (1994) (21)
- Cyberspace attacks and countermeasures (1997) (21)
- Discussing cyber attack (2010) (21)
- The US key escrow encryption technology (1994) (19)
- Obstacles and Options for Cyber Arms Controls (2001) (18)
- On the Derivation of Lattice Structured Information Flow Policies (1976) (18)
- Toward more secure software (2015) (18)
- Reflections on Cyberweapons Controls (2009) (17)
- Element-level classification with A1 assurance (1988) (17)
- Proceedings of the 1st ACM conference on Computer and communications security (1993) (16)
- A taxonomy for key recovery encryption systems (1997) (16)
- The Clipper Encryption System (1993) (16)
- Information Technology and Security (2003) (16)
- Ophthalmic thermal injuries. (1996) (15)
- Is Quantum Computing a Cybersecurity Threat? (2019) (15)
- Master Keys for Group Sharing (1981) (15)
- The Dark Web Forum Portal: From multi-lingual to video (2011) (15)
- Blogs and Military Information Strategy (2006) (14)
- The Profession of IT, Discussing Cyber Attack (2010) (14)
- Lessons Learned from Modeling a Secure Multilevel Relational Database System (1988) (14)
- Are statistical data bases secure ? (13)
- Final thoughts (1993) (13)
- Encryption and evolving technologies: Tools of organized crime and terrorism. (1997) (13)
- Crypto policy perspectives (1994) (13)
- Barriers to Entry: Are They Lower for Cyber Warfare? (2009) (12)
- Securing Data Bases under Linear Queries (1977) (12)
- Key Escrow Encryption Policies and Technologies (1996) (11)
- Research Topics in Statistical Database Management (1983) (10)
- Cyber Security as an Emergent Infrastructure (2003) (10)
- Dilemmas of artificial intelligence (2020) (9)
- The United States vs. Craig Neidorf: A debate on electronic publishing, Constitutional rights and hacking (1991) (8)
- The case for “Clipper” (1995) (7)
- More on Master Keys for Group Sharing (1981) (7)
- International encryption policy (1997) (6)
- Information Assurance Technology Forecast 2008 (2008) (6)
- An Evolution of Views (1992) (6)
- Who holds the keys? (1992) (6)
- Cyberwarfare (2011) (6)
- Analytical Techniques Development for a Statistical Intrusion Detection System (sids) Based on Accounting Records. Technical Report, 3.8 Clyde Digital Systems' Audit (2007) (5)
- The Many-Time Pad: Theme and Variations (1983) (5)
- Signature Protocols for RSA and Other Public- Key Cryptosystems (1982) (5)
- Artificial stupidity (2004) (5)
- Designing Deception Operations for Computer Network Defense (2005) (5)
- Restriciting Queries that Might Lead to Compromise (1981) (5)
- Clipper Chip Will Reinforce Privacy (1995) (4)
- A taxonomy for key escrow encryption systems : How to use key escrow (1996) (4)
- Assessing the Computer Network Operations Threat of Foreign Countries(PREPRINT) (2007) (4)
- Crime and crypto on the information superhighway (1995) (4)
- Encrypting the global information infrastructure (1996) (4)
- Privacy and Security Toward More Secure Software (2015) (4)
- Psychological Vulnerabilities to Deception, for Use in Computer Security (2007) (4)
- Information warefare and security (2000) (3)
- Encryption policy and market trends (1997) (3)
- The Future of Cryptography (2018) (3)
- Active Cyber Defense : Applying Air Defense to the Cyber Domain 1 (2015) (3)
- International key escrow encryption: proposed objectives and options (1995) (2)
- Assessing the CNO Threat of Foreign Countries (2007) (2)
- The Policy Debate (1995) (2)
- Discussion: Pros and Cons of the Various Approaches (1992) (2)
- Hacktivism and other net crimes (2000) (2)
- Selectively Defined Subsystems (1974) (2)
- Technical correspondence: on secure personal computing (1980) (2)
- Moral Cyber Weapons (2014) (2)
- Cryptography in public: a brief history (1995) (2)
- Embellishments to the note on information flow into arrays (1980) (2)
- Whither Cyber Terror? 10 Years After September 11 (2011) (2)
- Guest Editors' Introduction: Securing the Domain Name System (2009) (2)
- To tap or not to tap. Comment (1993) (2)
- Proving Protection Systems Safe (1976) (2)
- A dialog on hacking and security (1991) (1)
- TriStrata : Breakthrough in Enterprise Security (2000) (1)
- Corrigenda: Linear Queries in Statistical Databases (1980) (1)
- Power Over Information Flow (2009) (1)
- Review of "Verifying security" by M. H. Cheheyl, M. Gasser, G. A. Huff, and J. K. Millen. Computing Surveys 13, 3 (September 1981). (1982) (1)
- A method for maintaining routing data in automated record keeping systems (1978) (1)
- The Global Flow of Information (2017) (1)
- Comments on Responsibility of and Trust in ISPs (2010) (1)
- French Criminal Justice: A Comparative Account of the Investigation and Prosecution of Crime in France – Jacqueline Hodgson (2006) (1)
- The Master Key Problem (1980) (1)
- Naval Postgraduate School - Cyber Summit (2009) (0)
- Needham-Schroeder Goes to Court (2004) (0)
- 1 POWER OVER INFORMATION FLOW (2011) (0)
- Cryptography and Computer Security (1982) (0)
- Database security (1988) (0)
- Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002 (2002) (0)
- Responses to “The consequences of computing” (1996) (0)
- A View of Cyberterrorism Five Years Later (PREPRINT) (2007) (0)
- Hiding Crimes in Cyberspace 1 (2008) (0)
- Protecting a Borderless World: Recognizing and Understanding Security Threats to E-Commerce (2001) (0)
- Information Operations and Terrorism (PREPRINT) (2005) (0)
- Hiding Crimes in Cyberspace (PREPRINT) (1999) (0)
- Oral history interview with Dorothy E. Denning (2013) (0)
- Starship Mission Destination Enterprise L Spying M 1 Rigel M 2 Enterprise L Spying M 1 ? Enterprise L ? Rigel M 2 5 Polyinstantiation Integrity Figure 6: Element-level Classiication 4.3 Tradeoo 4.2 Element-level Classiication (1993) (0)
- Key Key Encrypt Decrypt Innovation (2003) (0)
- Security Capabilities, Privacy & Integrity (1991) (0)
- Handshakes Are Shaky (1979) (0)
- 3.3 Validity Checking (2007) (0)
- The Seaview Security (2009) (0)
- Take This Joke Seriously (2011) (0)
- Information Technology and Security (PREPRINT) (2003) (0)
- Operating Systems Articles (1980) (0)
- Linear Queries in Statistical Data Bases Linear Queries in Statistical Data Bases (2020) (0)
- The objective of the U.S. Government's Escrowed Encryption Standard and associated Key Escrow System is to provide strong security for communications while simultaneously allowing authorized government access to particular communications for law enforcement and national security purposes. (1994) (0)
- Comments from the program Co-Chairperson (1984) (0)
- Is Cyber Terrorism Coming (2002) (0)
- 4.2.3 Resolver Component 4.3 Nides Security Oocer User Interface 4.4 Nides Infrastructural Components 4.2.1 Statistical Analysis Component 4.2.2 Rulebased Analysis Component (2007) (0)
- EVOLVING TECHNOLOGIES AS TOOLS OF ORGANIZED CRIME AND TERRORISM (2017) (0)
- 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, 10-12 July, 2011 (2011) (0)
- Purdue e-Pubs Purdue e-Pubs Certification of Programs for Secure Information Flow Certification of Programs for Secure Information Flow (2020) (0)
- Research in Secure Computing (Final Report) (1980) (0)
- Personal Keys, Group Keys and Master Keys (1980) (0)
- A note from your secretary-treasurer (1978) (0)
- Cyber Security as an Emergent Infrastructure (PREPRINT) (2003) (0)
- A note from your secretary-treasurer (1979) (0)
- A note from your secretary-treasurer (1980) (0)
- Law Enforcement & Civil Liberties (1991) (0)
- Key Escrow Cryptosystems (1995) (0)
This paper list is powered by the following services:
Other Resources About Dorothy E. Denning
What Schools Are Affiliated With Dorothy E. Denning?
Dorothy E. Denning is affiliated with the following schools: