gptkbp:instanceOf
|
gptkb:person
|
gptkbp:almaMater
|
gptkb:University_of_Michigan
|
gptkbp:awardReceived
|
gptkb:ACM_Fellow
gptkb:Augusta_Ada_Lovelace_Award
gptkb:Cyber_Security_Hall_of_Fame
gptkb:Information_Systems_Security_Association_Hall_of_Fame
gptkb:National_Computer_Systems_Security_Award
|
gptkbp:birthDate
|
1945
|
gptkbp:doctoralAdvisor
|
gptkb:Bernard_A._Galler
|
gptkbp:employer
|
gptkb:Georgetown_University
gptkb:Naval_Postgraduate_School
gptkb:Purdue_University
gptkb:SRI_International
|
gptkbp:fieldOfWork
|
computer security
cryptography
cybersecurity
information warfare
|
https://www.w3.org/2000/01/rdf-schema#label
|
Dorothy E. Denning
|
gptkbp:knownFor
|
cryptography
information security
data security
intrusion detection
|
gptkbp:memberOf
|
gptkb:American_Association_for_the_Advancement_of_Science
gptkb:Association_for_Computing_Machinery
|
gptkbp:nationality
|
gptkb:United_States
|
gptkbp:notableWork
|
gptkb:Cryptography_and_Data_Security
gptkb:Information_Warfare_and_Security
|
gptkbp:occupation
|
gptkb:computer_scientist
gptkb:professor
author
|
gptkbp:spouse
|
gptkb:Peter_J._Denning
|
gptkbp:thesisTitle
|
Secure Information Flow in Computer Systems
|
gptkbp:thesisYear
|
1975
|
gptkbp:bfsParent
|
gptkb:Denning
gptkb:Peter_Denning
|
gptkbp:bfsLayer
|
6
|