This webpage is an attempt to assemble a ranking of top-cited security papers from the 1980s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.
Top-cited papers from 1989 ⌄
1
D. F. C. Brewer and Michael J. Nash: The Chinese Wall Security Policy. IEEE Symposium on Security and Privacy (S&P), 1989
Mark W. Eichin and Jon A. Rochlis: With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. IEEE Symposium on Security and Privacy (S&P), 1989
Lein Harn, Yaw-Ruey Chien, and Thomas Kiesler: An extended cryptographic key generation scheme for multilevel data security. Annual Computer Security Applications Conference (ACSAC), 1989
Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, William R. Shockley, and Mark R. Heckman: The SeaView security model. IEEE Symposium on Security and Privacy (S&P), 1988
Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark R. Heckman, and Dan Warren: A near-term design for the SeaView multilevel database system. IEEE Symposium on Security and Privacy (S&P), 1988
David D. Clark and D. R. Wilson: A Comparison of Commercial and Military Computer Security Policies. IEEE Symposium on Security and Privacy (S&P), 1987
Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark R. Heckman, and William R. Shockley: A Multilevel Relational Data Model. IEEE Symposium on Security and Privacy (S&P), 1987
Chii-Ren Tsai, Virgil D. Gligor, and C. Sekar Chandersekaran: A Formal Method for the Identification of Covert Storage Channels in Source Code. IEEE Symposium on Security and Privacy (S&P), 1987
Tzong-An Su and Gultekin Özsoyoglu: Data Dependencies and Inference Control in Multilevel Relational Database Systems. IEEE Symposium on Security and Privacy (S&P), 1987
Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, and Mark R. Heckman: Views for Multilevel Database Security. IEEE Symposium on Security and Privacy (S&P), 1986
Andrew Birrell, Butler W. Lampson, Roger M. Needham, and Michael D. Schroeder: A Global Authentication Service without Global Trust. IEEE Symposium on Security and Privacy (S&P), 1986
John E. Dobson and Brian Randell: Building Reliable Secure Computing Systems out of Unreliable Insecure Components. IEEE Symposium on Security and Privacy (S&P), 1986
J. Thomas Haigh, Richard A. Kemmerer, John McHugh, and William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Symposium on Security and Privacy (S&P), 1986
J.-M. Fray, Yves Deswarte, and David Powell: Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. IEEE Symposium on Security and Privacy (S&P), 1986
Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, and N. Vasudevan: On the Design and the Implementation of Secure Xenix Workstations. IEEE Symposium on Security and Privacy (S&P), 1986
John McHugh and Andrew P. Moore: A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network. IEEE Symposium on Security and Privacy (S&P), 1986
Deborah Downs, Jerzy R. Rub, Kenneth C. Kung, and Carole S. Jordan: Issues in Discretionary Access Control. IEEE Symposium on Security and Privacy (S&P), 1985
Dorothy E. Denning: Commutative Filters for Reducing Inference Threats in Multilevel Database Systems. IEEE Symposium on Security and Privacy (S&P), 1985
William Earl Boebert, R. Y. Kaln, William D. Young, and S. A. Hansohn: Secure Ada Target: Issues, System Design, and Verification. IEEE Symposium on Security and Privacy (S&P), 1985
G. R. Blakley and Catherine Meadows: A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data. IEEE Symposium on Security and Privacy (S&P), 1985
Richard D. Graubart and Kevin J. Duffy: Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS. IEEE Symposium on Security and Privacy (S&P), 1985
Raymond M. Wong, Thomas A. Berson, and Richard J. Feiertag: Polonium: An Identity Authentication System. IEEE Symposium on Security and Privacy (S&P), 1985
Paul A. Karger and A. J. Herbert: An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. IEEE Symposium on Security and Privacy (S&P), 1984
M. Schaefer and Roger R. Schell: Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products. IEEE Symposium on Security and Privacy (S&P), 1984
John D. McLean, Carl E. Landwehr, and Constance L. Heitmeyer: A Formal Statement of the MMS Security Model. IEEE Symposium on Security and Privacy (S&P), 1984
C. A. Asmuth and G. R. Blakley: Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication. IEEE Symposium on Security and Privacy (S&P), 1982
Dorothy E. Denning, Jan Schlörer, and Elisabeth Wehrle: Memoryless Inference Controls for Statistical Databases. IEEE Symposium on Security and Privacy (S&P), 1982
Gustavus J. Simmons and Diane B. Holdridge: Forward Search as a Cryptanalytic Tool Against a Public Key. IEEE Symposium on Security and Privacy (S&P), 1982
Allen Stoughton: Access Flow: A Protection Model which Integrates Access Control and Information Flow. IEEE Symposium on Security and Privacy (S&P), 1981
David A. Bonyun: The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security. IEEE Symposium on Security and Privacy (S&P), 1981
Carl H. Meyer, Stephen M. Matyas, and Richard E. Lennon: Required Cryptographic Authentication Criteria for Electronic Funds Transfer Systems. IEEE Symposium on Security and Privacy (S&P), 1981
Lyle A. Cox Jr. and Roger R. Schell: The Structure of a Security Kernel for the Z8000 Multiprocessor. IEEE Symposium on Security and Privacy (S&P), 1981
G. R. Blakley: One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist. IEEE Symposium on Security and Privacy (S&P), 1980
George I. Davida, Richard A. DeMillo, and Richard J. Lipton: A System Architecture to Support a Verifiably Secure Multilevel Security System. IEEE Symposium on Security and Privacy (S&P), 1980
Stanley R. Ames Jr. and James G. Keeton-Williams: Demonstrating Security for Trusted Applications on a Security Kernel Base. IEEE Symposium on Security and Privacy (S&P), 1980