Author: Dorothy E. Denning
Publications
Co-authors
Productive Colleagues
Publications
Denning, Peter J., Denning, Dorothy E. (2004): Artificial stupidity. In Communications of the ACM, 47 (5) pp. 112. https://dl.acm.org/doi/10.1145/986213.986246
Long, Jeffrey G., Denning, Dorothy E. (1995): Ultra-Structure: A Design Theory for Complex Systems and Processes. In Communications of the ACM, 38 (1) pp. 103-120.
Landau, Susan, Kent, Stephen T., Brooks, Clint, Charney, Scott, Denning, Dorothy E., Diffie, Whitfield, Lauck, Anthony, Miller, Douglas, Neumann, Peter G., Sobel, David (1994): Crypto Policy Perspectives. In Communications of the ACM, 37 (8) pp. 115-121.
Denning, Dorothy E., Godwin, Mike, Bayse, William A., Rotenberg, Marc, Branscomb, Lewis M., Branscomb, Anne M., Rivest, Ronald L., Grosso, Andrew, Marx, Gary T. (1993): To Tap or not to Tap. In Communications of the ACM, 36 (3) pp. 24-44.
Denning, Dorothy E. (1991): The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rig. In Communications of the ACM, 34 (3) pp. 22-43.
Denning, Dorothy E. (1984): Digital Signatures with RSA and Other Public-Key Cryptosystems. In Communications of the ACM, 27 (4) pp. 388-392.
Denning, Dorothy E., Schlorer, Jan (1983): Inference Controls for Statistical Databases. In IEEE Computer, 16 (7) pp. 69-82.
Denning, Dorothy E., Sacco, Giovanni Maria (1981): Timestamps in Key Distribution Protocols. In Communications of the ACM, 24 (8) pp. 533-536.
Denning, Dorothy E. (1979): Secure Personal Computing in an Insecure Network. In Communications of the ACM, 22 (8) pp. 476-482.
Denning, Dorothy E., Denning, Peter J. (1977): Certification of Programs for Secure Information Flow. In Communications of the ACM, 20 (7) pp. 504-513.
Denning, Dorothy E. (1976): A Lattice Model of Secure Information Flow. In Communications of the ACM, 19 (5) pp. 236-243.