EditWYSIWYGAttach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
1119 Feb 2014 - 13:06norqu036? 
1003 Oct 2013 - 14:43norqu036? 
918 Jun 2013 - 16:21ThomasMisa 
812 Jun 2013 - 14:15NicLewis 
712 Jun 2013 - 14:14NicLewis 
612 Jun 2013 - 12:30NicLewis 
512 Jun 2013 - 09:57NicLewis 
411 Jun 2013 - 21:21NicLewis 
311 Jun 2013 - 17:14NicLewis 
211 Jun 2013 - 14:20NicLewis 
earlier first

Render style:     Context:


 History: r11 < r10 < r9 < r8 < r7
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>People>PeopleDenningDorothy (revision 10)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Dorothy Denning

 

With a B.A. and M.A. in mathematics from the University of Michigan, and a Ph.D. in computer science from Purdue, Dorothy Denning is currently a Distinguished Professor at the Naval Postgraduate School. Introduced to computer security work in her first graduate school course on operating systems, Denning is perhaps best known for her 1976 publication, "A Lattice Model of Secure Information Flow," which established a mathematical basis for enforcing information security on a computer system.(1) Denning served as a computer science professor at Purdue from 1975 to 1983. While teaching a course on computer security in the late 1970s, Denning determined that none of the existing textbooks addressed the latest developments in computer security, such as the Diffie-Hellman paper on public key cryptography, or its subsequent practical implementations. In 1982, Denning completed Cryptography and Data Security, which became a standard text in the burgeoning field of computer security.(2) This publication coincided with a growing controversy between the National Security Agency and security researchers. The NSA stated that divulging cryptographic techniques to the public posed a national security threat. Denning did not agree, although she would later change her position on public cryptography.(3)

In 1983, Denning joined the Stanford Research Institute (SRI), where she continued her work in computer security, developing a system for intrusion detection. In 1987, she examined graphics and interfaces at Digital Equipment Corporation's Palo Alto research center. In the early 1990s, Denning pursued her interest in hacker culture, writing about the public misconceptions of young hackers -- a position she would later recant. In 1991, Denning became chair of the Georgetown University Computer Science Department, remaining at Georgetown until 2002, when she joined the Naval Postgraduate School as a professor and Department of Defense analyst. She has continued to write numerous articles, book chapters, and essays regarding computer security and related topics, including privacy, hacking, and cyber terror. (4)(5)(6)

Interviewed for CBI oral history: 4/11/2013.

Notes

1 : lock Dorothy E. Denning, "A Lattice Model of Secure Information Flow," 236-238, in Communications of the ACM 19, no. 5 (May 1976), 236-243. (Login required)

2 : Denning-CryptographyDataSecurity.pdf: Digital version of Denning, D. E., Cryptography and Data Security, Addison‑Wesley, May 1982.

3 , 4 : Steven Levy, "Clipper Chick: Changing sides in the government's war against piracy, Dorothy Denning went from hacker hero to one of the most hated people on the Net," Wired, Issue 4.09 (September 1996).

5 : http://faculty.nps.edu/dedennin/NPS%20vita%20for%20Dorothy%20E_%20Denning.htm

6 : http://faculty.nps.edu/dedennin/


Edit | WYSIWYG | Attach |  PDF |  History: r11 < r10 < r9 < r8 < r7 |  Backlinks |  Raw View | More topic actions...
Topic revision: r10 - 03 Oct 2013 - 14:43:53 - norqu036
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback