Dorothy E. Denning
Affiliations:- Naval Postgraduate School, Department of Defense Analysis, Monterey, CA, USA
According to our database1,
Dorothy E. Denning
authored at least 64 papers
between 1975 and 2020.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 1995, "For technical leadership and professional contributions that advanced the field of computer and communications security and promoted the open exchange of ideas and information.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on idref.fr
-
on viaf.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2020
2015
2014
2012
2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
2010
Developing a Dark Web collection and infrastructure for computational and social sciences.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010
2009
IEEE Secur. Priv., 2009
2008
2004
2003
Cyber Security as an Emergent Infrastructure.
Proceedings of the Security Education and Critical Infrastructures, 2003
2000
Information warefare and security.
Addison-Wesley-Longman, ISBN: 978-0-201-43303-6, 2000
1996
Proceedings of the Computerization and Controversy, 2nd Ed., 1996
1995
Commun. ACM, 1995
1994
1993
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993
1992
Proceedings of the Second Conference on Computers, Freedom and Privacy, 1992
1991
The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking.
Commun. ACM, 1991
1990
1988
1987
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987
Lessons Learned from Modeling a Secure Multilevel Relational Database System.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987
1986
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986
1985
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985
1984
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984
1983
Proceedings of the Second International Workshop on Statistical Database Management, 1983
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983
Field Encryption and Authentication.
Proceedings of the Advances in Cryptology, 1983
1982
Review of "Verifying security" by M. H. Cheheyl, M. Gasser, G. A. Huff, and J. K. Millen. Computing Surveys 13, 3 (September 1981).
ACM SIGSOFT Softw. Eng. Notes, 1982
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982
Cryptography and Data Security
Addison-Wesley, 1982
1981
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981
1980
ACM Trans. Database Syst., 1980
Corrigenda: Linear Queries in Statistical Databases.
ACM Trans. Database Syst., 1980
ACM Trans. Database Syst., 1980
ACM SIGSOFT Softw. Eng. Notes, 1980
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
1979
ACM Trans. Database Syst., 1979
1978
Proceedings of the IEEE Computer Society's Second International Computer Software and Applications Conference, 1978
Are statistical databases secure?
Proceedings of the American Federation of Information Processing Societies: 1978 National Computer Conference, 1978
1977
Securing Data Bases under Linear Queries.
Proceedings of the Information Processing, 1977
1976
1975