Dorothy Denning | |
Birth Name: | Dorothy Elizabeth Robling |
Birth Date: | 12 August 1945 |
Nationality: | American |
Fields: | Computers Information security |
Thesis Title: | Secure Information Flow in Computer Systems |
Thesis Url: | https://www.worldcat.org/oclc/633948116 |
Thesis Year: | 1975 |
Doctoral Advisor: | Herbert Schwetman |
Awards: | ACM Fellow (1995) National Cyber Security Hall of Fame (2012) |
Dorothy Elizabeth Denning (née Robling, born August 12, 1945) is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.[1] [2] [3] [4]
Dorothy Elizabeth Robling, daughter of C. Lowell and Helen Watson Robling, grew up in Grand Rapids, Michigan. She earned a Bachelor of Arts degree in mathematics in 1967 followed by a Master of Arts degree in 1969 at the University of Michigan. Her PhD thesis was on Secure Information Flow in Computer Systems and awarded in 1975 by Purdue University.
Denning began her academic career at Purdue University as assistant professor from 1975 to 1981. While associate professor at Purdue (1981-1983), she wrote her first book, Cryptography and Data Security in 1982. She joined SRI International as computer scientist from 1983 to 1987, working on the first intrusion detection system and on database security. After a stint as principal software engineer at Digital Equipment Corporation's Palo Alto Systems Research Center (1987-1991), she returned to academe as chair of the Computer Science Department at Georgetown University. She later became Georgetown's Patricia and Patrick Callahan Family Professor of Computer Science and director of the Georgetown Institute of Information Assurance. In 2002 Denning became professor in the Department of Defense Analysis at the Naval Postgraduate School, Monterey, California, then distinguished professor in 2009, retiring as emeritus distinguished professor at the end of 2016.
Throughout her career, Denning anticipated and addressed the cyber security issues of the day. She was the first president of the International Association for Cryptologic Research (1983-1986). With husband Peter in 1997 she edited Internet Besieged: Countering Cyberspace Scofflaws, a comprehensive collection of essays on cyber security. In 1998 she wrote Information Warfare and Security. She testified multiple times before various congressional subcommittees studying technology,[5] infrastructure,[6] intellectual property,[7] and cyberterrorism.[8] [9] Her innovations won awards, and her opinions stirred up controversy. A full list of publications is available on her full vita at the Naval Postgraduate School website.
Denning has received over 20 awards for her innovations in computer security. Key contributions are described below.
"A Lattice Model of Secure Information Flow" presented in 1975[10] provided a method for controlling access to data which is still used today.
Detecting intruders is key to protecting computer systems. While at SRI International, Denning and Peter G. Neumann developed an intrusion detection system (IDS) model using statistics for anomaly detection that is still the basis for intrusion detection systems today. SRI's Intrusion Detection Expert System (IDES)[11] ran on Sun workstations and considered both user and network level data. It combined a rule-based Expert System to detect known types of intrusions with a statistical anomaly-detection component based on profiles of users, host systems, and target systems. (An artificial neural network was proposed as a third component; All three components would then report to a resolver). SRI followed IDES in 1993 with the Next-generation Intrusion Detection Expert System (NIDES).[12] The Multics Intrusion Detection and Alerting System (MIDAS), which protected the National Security Agency's Dockmaster System from 1998 to 2001, is an example of a fielded expert-system-based IDS.[13]
Denning improved data security via encryption technology. She introduced timestamps in key distribution protocols,[14] cryptographic checksums for multilevel database security,[15] and a method for improving the security of digital signatures with RSA and other public key crypto systems.[16] She considered key escrow systems,[17] [18] Internet crime[19] and hacking.[20] Her book Cryptography and Data Security[21] became an ACM Classic, introducing cryptography to many.
In database security, Denning found ways to reduce inference threats in multilevel databases.[22] She reported on the problems of working with data across different classification levels.[23]
With L. Scott, Denning wrote two papers on using Global Positioning Systems for geo-encryption to enhance data security.[24] [25]
Although she remained a technical expert, Denning's interests evolved to consider legal, ethical, and social issues. She addressed wiretapping,[26] the growth of the Internet,[27] cyber terrorism[28] and cyber warfare.[29] Her most recent papers focused on current cyber threats[30] and defenses.[31]
Denning interviewed hackers for her research on hacking and "hactivism".[32] She was criticized when she found positive things to say about their actions and wrote a 1995 postscript.
Denning was widely criticized for her role in NSA's controversial Clipper chip initiative to give the government authorized access to encrypted private communications through a key escrow system. At the government's request Denning privately reviewed the classified Skipjack block cipher, and testified in Congress that general publication of the algorithm would enable someone to build a hardware or software product that used SKIPJACK without escrowing keys.[33] In public forums, such as the Usenet forum comp.risks, she defended the Clipper chip and other approaches to key escrow that offered strong security while enabling law enforcement to decrypt without a warrant.[34] However, she did not advocate making key escrow mandatory. Eventually, Clipper was dropped and Skipjack was declassified and published.
Denning served as an expert witness in the 1990 trial of United States v. Riggs. Her testimony helped lead the government to drop charges against defendant Craig Neidorf,[35] who had taken an electronic 911 directory across state lines.
In 1992, Denning challenged the existing national standard for evaluating trusted systems (TCSEC), noting that "By the time a system is evaluated it is obsolete." She maintained that "trust is not a property but an assessment" by the real world market.[36] This was not the only criticism, and the TCSEC has since been replaced.
Lack of product liability for software is a contentious topic. When Denning proposed software vendors accept liability for errors in their products,[37] the industry pushed back. Steve Lipner, charged with software security at Microsoft, argued that companies with deep pockets like Microsoft would be sued to death, even if they proved repeatedly that they followed the best secure software development practices.[38] A few large vendors, such as Volvo, have announced plans to accept both hardware and software liability in their future autonomous cars when national product liability standards are established.[39]
The New Jersey City University named its new security center the Dr. Dorothy E. Denning Center of Academic Excellence in Information Assurance Education.[42]
While working on her PhD in computer science at Purdue University, she married Peter J. Denning in 1974.