Between Dec 22, 2025 and Jan 5, 2026, items can be submitted to the UDC and DRUM, but will not be processed until after the break. Staff will not be available to answer email during this period, and will not be able to provide DOIs for datasets until after Jan 5. If you are in need of a DOI during this period, consider Figshare, Zenodo, Open Science Framework, Harvard Dataverse or OpenICPSR.

Oral history interview with Dorothy E. Denning

Loading...
Thumbnail Image

Persistent link to this item

Statistics
View Statistics

Journal Title

Journal ISSN

Volume Title

Published Date

Publisher

Charles Babbage Institute

Abstract

Computer security pioneer Dorothy Denning discusses her career including her Lattice Model for Computer Security, research on database security, intrusion detection, and other areas, such as her influential textbooks. The interview also addresses computer security research infrastructure and collaborators at various institutions where she worked including Purdue University, SRI International, Digital Equipment Corporation, Georgetown University, and Naval Postgraduate School. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Description

Transcript, 65 pp.

Related to

Replaces

License

Series/Report Number

Funding information

National Science Foundation Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Isbn identifier

Doi identifier

Previously Published Citation

Dorothy E. Denning, OH 424. Oral history interview by Jeffrey R. Yost, 11 April 2013, Monterey, CA. Charles Babbage Institute, University of Minnesota, Minneapolis. http://purl.umn.edu/156519

Other identifiers

OH 424

Suggested citation

Denning, Dorothy E.. (2013). Oral history interview with Dorothy E. Denning. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/156519.

Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.