WorldCat Identities

Denning, Dorothy Elizabeth Robling 1945-

Works: 34 works in 123 publications in 4 languages and 3,964 library holdings
Genres: Conference papers and proceedings  Abstracts 
Roles: Author, Editor
Publication Timeline
Most widely held works by Dorothy Elizabeth Robling Denning
Rights and responsibilities of participants in networked communities by Dorothy Elizabeth Robling Denning( )

14 editions published between 1900 and 1994 in English and held by 2,191 WorldCat member libraries worldwide

This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services, and grass-roots networks. The following questions were addressed in the workshop: (1) What policies, laws, regulations, or ethical standards apply to the use of networked services; who sets them; how are they developed; and how are they enforced? (2) What are users' expectations regarding privacy and protection of their proprietary rights? (3) What are the rights, responsibilities, and liabilities of providers or operators of networked services or of users of these services? And (4) What problems arise from connecting systems offering these services to systems that operate under different policies? The forum was organized around a set of hypothetical scenarios designed to illuminate how issues related to and associated with free speech, electronic vandalism, the protection of intellectual property interests, and privacy might emerge. The intent was to focus on the concerns that policymakers in government and the private sector might have, so much of the discussion involved questions of law and how the current legal regime helps to define the boundaries of what is or is not acceptable conduct on electronic networks. Background materials on technology, legal underpinnings, and the current policy environment are incorporated into chapters 1 through 3. Chapters 4 through 7 are devoted primarily to discussions of free speech, electronic vandalism, intellectual property interests, and privacy. Chapter 8 focuses on the deliberations of the steering committee. Five appendices provide information about network technology, the agendas for the workshop and forum, and biographies of the steering committee. (Mas)
Cryptography and data security by Dorothy Elizabeth Robling Denning( Book )

29 editions published between 1982 and 1997 in 3 languages and held by 592 WorldCat member libraries worldwide

Encryption algorithms. Cryptographic technique. Access controls. Information controls. Inference controls
Information warfare and security by Dorothy Elizabeth Robling Denning( Book )

19 editions published between 1999 and 2006 in 3 languages and held by 510 WorldCat member libraries worldwide

In Information Warfare and Security, Dorothy E. Denning, a pioneer in computer security, provides a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary
Internet besieged : countering cyberspace scofflaws by Dorothy Elizabeth Robling Denning( Book )

10 editions published between 1997 and 1998 in English and Undetermined and held by 356 WorldCat member libraries worldwide

Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingenious strategies employed by intruders. It shows how security experts must be both defensive and proactive to protect information, privacy, and electronic commerce
Blogs and military information strategy by James Kinniburgh( )

5 editions published in 2006 in English and held by 233 WorldCat member libraries worldwide

A blog is a journal available on the Web that comes in many forms of potential influence: political, online diary, video, spam, mobile (Internet postings from a mobile phone, etc.), or travel, among others. The authors offer a balanced critique of the positive and negative aspects of blogging, and then offer the opportunities of this trend for influence operations
Encryption is a sword that cuts two ways by Dorothy Elizabeth Robling Denning( Visual )

3 editions published between 1994 and 1995 in English and held by 13 WorldCat member libraries worldwide

Dorothy Denning discusses how encryption hides information by transforming it so that the information cannot be read by someone who does not know a secret key. She makes the point that encryption can be used to both protect against criminal activity and to conceal criminal activities. She also speaks about her personal perspectives as a woman working in computer science
Encryption and evolving technologies : tools of organized crime and terrorism by Dorothy Elizabeth Robling Denning( Book )

2 editions published between 1989 and 1997 in English and held by 10 WorldCat member libraries worldwide

Secure information flow in computer systems by Dorothy Elizabeth Robling Denning( )

3 editions published between 1975 and 1982 in English and Undetermined and held by 6 WorldCat member libraries worldwide

Ethics & education( Visual )

1 edition published in 1991 in English and held by 5 WorldCat member libraries worldwide

Speakers discuss the teaching of ethics in computer education
An intrusion-detection model by Dorothy Elizabeth Robling Denning( Book )

3 editions published in 1987 in English and held by 5 WorldCat member libraries worldwide

A model of a real-time, intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system
A multilevel relational data model by Dorothy Elizabeth Robling Denning( Book )

1 edition published in 1987 in English and held by 5 WorldCat member libraries worldwide

Law enforcement and civil liberties( Visual )

1 edition published in 1991 in English and held by 5 WorldCat member libraries worldwide

Speakers discuss the use of computers as an aid for investigations, also stating the need for the determination of a dividing line between civil liberties and law enforcement
A View of Cyberterrorism Five Years Later (PREPRINT)( )

2 editions published in 2007 in English and held by 3 WorldCat member libraries worldwide

The purpose of this chapter is to assess the cyberterror threat, particularly from al-Qa'ida and the global jihadists who are part of the broader social movement associated with al-Qa'ida. As such, the view offered here supercedes that which the author presented 5 years ago, first to the Special Oversight Panel on Terrorism of the Committee on Armed Services in the U.S. House of Representatives in May 2000, and then in an article written shortly after the September 11 attacks in 2001. This assessment was based primarily on speculation as to what terrorists would likely be interested in and capable of achieving. The author's overall conclusion was that, at least for the time being, bombs posed a much greater threat than bytes, but the United States should not shrug off the threat. The assessment offered in this paper is based less on speculation and more on indicators of cyberterrorism. These are pieces of evidence that demonstrate a capability or intent to conduct acts of cyberterror. The ones the author has identified so far fall into five categories: (1) Execution of cyber attacks; (2) Cyber weapons acquisition, development, and training; (3) Statements about cyber attacks; (4) Formal education in information technology; and (5) General experience with cyberspace. The categories are listed in order of generally decreasing significance; that is, the actual execution of cyber attacks carries more weight than acquisition and development of cyber attack tools, which in turn carries more weight than simply making statements about cyber attacks. Each category is then examined in terms of the evidence found so far. The author also describes two studies of cyberterror conducted by the Center on Terrorism and Irregular Warfare at the Naval Postgraduate School in 1999 and 2000
Personal keys, group keys and master keys by Dorothy Elizabeth Robling Denning( Book )

2 editions published in 1980 in English and held by 3 WorldCat member libraries worldwide

Hiding Crimes in Cyberspace (PREPRINT)( Book )

2 editions published in 1999 in English and held by 2 WorldCat member libraries worldwide

The growth of telecommunications and electronic commerce has led to a growing commercial market for digital encryption technologies. Business needs encryption to protect intellectual property and to establish secure links with their partners, suppliers, and customers. Banks need it to ensure the confidentiality and authenticity of financial transactions. Law enforcement needs it to stop those under investigation from intercepting police communications and obstructing investigations. Individuals need it to protect their private communications and confidential data. Encryption is critical to building a secure and trusted global information infrastructure for communications and electronic commerce. Encryption also gives criminals and terrorists a powerful tool for concealing their activities. It can make it impossible for law enforcement agencies to obtain the evidence needed for a conviction or the intelligence vital to criminal investigations. It can frustrate communications intercepts, which have played a significant role in averting terrorist attacks and in gathering information about specific transnational threats, including terrorism, drug trafficking, and organized crime. It can delay investigations and add to their cost. Section 1 describes criminal use of encryption in voice and data communications, electronic mail, stored files, and public postings. Section 2 examines encryption and the options available to law enforcement for dealing with it. Section 3 describes a variety of tools for concealing information: passwords, digital compression, steganography, remote storage, and audit disabling. Section 4 describes tools for hiding crimes through anonymity: anonymous remailers, anonymous digital cash, computer penetration and looping, cellular phone cloning, and cellular phone cards. Numerous case studies are presented for illustration
Information Technology and Security (PREPRINT)( Book )

2 editions published in 2003 in English and held by 2 WorldCat member libraries worldwide

This paper examines key trends and developments in information technology, and the implications of these developments for national stability and security. The primary focus is on cyberthreats to computer networks, including information theft, sabotage, and acts that disrupt or deny service. Seven trend areas are examined: ubiquity, mobility, hacking tools, performance, vulnerabilities, groundedness, and information security. Trends in these areas are related to an increase in the number and severity of cyber-related security incidents, and the potential to cause considerable damage. The paper also examines prospects for the future, particularly the threat of cyberterrorism. The author concludes with summaries of public, private, military, and partnership initiatives for improving the cyber defense capability of the nation, and her own recommendations for improving cyber defense
Is Cyber Terrorism Coming?( Book )

2 editions published in 2002 in English and held by 2 WorldCat member libraries worldwide

The author begins her presentation by talking about cyber attacks generally and to what extent they are occurring throughout the world. She also discusses the reasons for these attacks, the vulnerabilities in computer systems, how cyber protestors are using the Internet, how terrorists are using the Internet, cyberterrorism, and computer system security
Assessing the Computer Network Operations Threat of Foreign Countries(PREPRINT)( Book )

2 editions published in 2007 in English and held by 2 WorldCat member libraries worldwide

As the introduction to this book so aptly stated, advances in information technologies simultaneously empower and imperil those who use them. They empower by facilitating communications and the flow of information; they emperil by introducing new vulnerabilities and targets of attack. Information strategy has to adapt to both of these effects, exploiting and leveraging the enabling technologies while protecting against threats to the very same technologies we come to rely upon. In this chapter I address the latter the defensive side of information strategy as it applies to computer and networking technologies. Computer networks have become the target of an ever increasing number of hackers, criminals, spies, and others who have found advantage in exploiting and damaging them. These actors penetrate computer networks in order to steal, degrade, and destroy information and information systems. They launch computer viruses and worms, conduct denial-of-service attacks, vandalize websites, and extort money from victims. The effects have been costly: businesses disrupted or closed, military systems disabled, emergency and banking services suspended, transportation delayed, military and trade secrets compromised, and identity theft and credit card fraud perpetrated around the globe. The potential consequences of cyber attacks will only get worse as our use of and reliance on information technologies increase
Cyber Security as an Emergent Infrastructure (PREPRINT)( Book )

2 editions published in 2003 in English and held by 2 WorldCat member libraries worldwide

To address today's threats to information-based systems, security has evolved from the simple access controls of 30 years ago to a complete infrastructure in its own right. This infrastructure serves to protect computers and networks, and the information that is generated, acquired, processed, transmitted, and stored by them. Like many of the systems it protects, the security infrastructure is global and interconnected. It is growing and evolving, and will continue to do so as long as information technology itself evolves. The objective of this chapter is to explore this emergent infrastructure and the factors that are shaping its development. The focus is on cybersecurity, which includes computer security and network security, but excludes those aspects of information security that deal with information that is not computerized (e.g., print media). The factors shaping the development of the security infrastructure are divided into five areas: threats, technology developments, economic factors, psychological factors, and social and political factors. These areas will be discussed after first describing the elements of security infrastructure. Limitations of space preclude giving more than a broad overview of the topics. Many issues are ignored or brushed over lightly. Further, more attention is paid to developments in the United States than elsewhere. The aim is a conceptual framework for understanding the state of security today rather than complete coverage of all the pieces of the framework
Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques( Book )

2 editions published in 2006 in English and held by 2 WorldCat member libraries worldwide

Deception offers one means of hiding things from an adversary. This paper introduces a model for understanding, comparing, and developing methods of deceptive hiding. The model characterizes deceptive hiding in terms of how it defeats the underlying processes that an adversary uses to discover the hidden thing. An adversary's process of discovery can take three forms: direct observation (sensing and recognizing), investigation (evidence collection and hypothesis formation), and learning from other people or agents. Deceptive hiding works by defeating one or more elements of these processes. The model is applied to computer security; it also is applicable to other domains
moreShow More Titles
fewerShow Fewer Titles
Audience Level
Audience Level
  Kids General Special  
Audience level: 0.27 (from 0.07 for Rights and ... to 0.94 for Assessing ...)

Information warfare and security
Information warfare and securityInternet besieged : countering cyberspace scofflaws
Alternative Names
Denning, Dorothy

Denning, Dorothy 1945-

Denning Dorothy E.

Denning, Dorothy E. 1945-

Denning, Dorothy Elizabeth Robling

Dorothy E. Denning American information security researcher

Dorothy E. Denning Amerikaans informatica

Dorothy E. Denning chercheuse en sécurité informatique américaine

Dorothy E. Denning especialista en informática

Dorothy E. Denning informatica statunitense

Dorothy E. Denning Informatikerin

Robling Denning, Dorothy Elizabet

Robling Denning, Dorothy Elizabeth.

Robling Denning, Dorothy Elizabeth 1945-

Robling, Dorothy Elizabeth Denning.

デニング, D. E. R