This webpage is an attempt to assemble a ranking of top-cited security papers from the 1980s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.
Top-cited papers from 1989 ⌄
1
D. F. C. Brewer and Michael J. Nash: The Chinese Wall Security Policy. IEEE Symposium on Security and Privacy (S&P), 1989
Mark W. Eichin and Jon A. Rochlis: With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. IEEE Symposium on Security and Privacy (S&P), 1989
Lein Harn, Yaw-Ruey Chien, and Thomas Kiesler: An extended cryptographic key generation scheme for multilevel data security. Annual Computer Security Applications Conference (ACSAC), 1989
George I. Davida, Yvo Desmedt, and Brian J. Matt: Defending Systems against Viruses through Cryptographic Authentication. IEEE Symposium on Security and Privacy (S&P), 1989
Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, William R. Shockley, and Mark R. Heckman: The SeaView security model. IEEE Symposium on Security and Privacy (S&P), 1988
Janice I. Glasgow, Glenn H. MacEwen, and Prakash Panangaden: Reasoning about Knowledge and Permission in Secure Distributed Systems. IEEE Computer Security Foundations Symposium (CSF), 1988
David D. Clark and D. R. Wilson: A Comparison of Commercial and Military Computer Security Policies. IEEE Symposium on Security and Privacy (S&P), 1987
Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark R. Heckman, and William R. Shockley: A Multilevel Relational Data Model. IEEE Symposium on Security and Privacy (S&P), 1987
Chii-Ren Tsai, Virgil D. Gligor, and C. Sekar Chandersekaran: A Formal Method for the Identification of Covert Storage Channels in Source Code. IEEE Symposium on Security and Privacy (S&P), 1987
Tzong-An Su and Gultekin Özsoyoglu: Data Dependencies and Inference Control in Multilevel Relational Database Systems. IEEE Symposium on Security and Privacy (S&P), 1987
Andrew Birrell, Butler W. Lampson, Roger M. Needham, and Michael D. Schroeder: A Global Authentication Service without Global Trust. IEEE Symposium on Security and Privacy (S&P), 1986
John E. Dobson and Brian Randell: Building Reliable Secure Computing Systems out of Unreliable Insecure Components. IEEE Symposium on Security and Privacy (S&P), 1986
J. Thomas Haigh, Richard A. Kemmerer, John McHugh, and William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Symposium on Security and Privacy (S&P), 1986
J.-M. Fray, Yves Deswarte, and David Powell: Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. IEEE Symposium on Security and Privacy (S&P), 1986
Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, and N. Vasudevan: On the Design and the Implementation of Secure Xenix Workstations. IEEE Symposium on Security and Privacy (S&P), 1986
John McHugh and Andrew P. Moore: A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network. IEEE Symposium on Security and Privacy (S&P), 1986
Deborah Downs, Jerzy R. Rub, Kenneth C. Kung, and Carole S. Jordan: Issues in Discretionary Access Control. IEEE Symposium on Security and Privacy (S&P), 1985
Dorothy E. Denning: Commutative Filters for Reducing Inference Threats in Multilevel Database Systems. IEEE Symposium on Security and Privacy (S&P), 1985
William Earl Boebert, R. Y. Kaln, William D. Young, and S. A. Hansohn: Secure Ada Target: Issues, System Design, and Verification. IEEE Symposium on Security and Privacy (S&P), 1985
G. R. Blakley and Catherine Meadows: A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data. IEEE Symposium on Security and Privacy (S&P), 1985
Richard D. Graubart and Kevin J. Duffy: Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS. IEEE Symposium on Security and Privacy (S&P), 1985
John D. McLean, Carl E. Landwehr, and Constance L. Heitmeyer: A Formal Statement of the MMS Security Model. IEEE Symposium on Security and Privacy (S&P), 1984
Paul A. Karger and A. J. Herbert: An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. IEEE Symposium on Security and Privacy (S&P), 1984
M. Schaefer and Roger R. Schell: Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products. IEEE Symposium on Security and Privacy (S&P), 1984
Robert R. Jueneman, Stephen M. Matyas, and Carl H. Meyer: Message Authentication with Manipulation Detection Code. IEEE Symposium on Security and Privacy (S&P), 1983
Thomas A. Berson, Richard J. Feiertag, and R. Kenneth Bauer: Processor-per-Domain Guard Architecture. IEEE Symposium on Security and Privacy (S&P), 1983
C. A. Asmuth and G. R. Blakley: Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication. IEEE Symposium on Security and Privacy (S&P), 1982
Dorothy E. Denning, Jan Schlörer, and Elisabeth Wehrle: Memoryless Inference Controls for Statistical Databases. IEEE Symposium on Security and Privacy (S&P), 1982
Gustavus J. Simmons and Diane B. Holdridge: Forward Search as a Cryptanalytic Tool Against a Public Key. IEEE Symposium on Security and Privacy (S&P), 1982
Allen Stoughton: Access Flow: A Protection Model which Integrates Access Control and Information Flow. IEEE Symposium on Security and Privacy (S&P), 1981
David A. Bonyun: The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security. IEEE Symposium on Security and Privacy (S&P), 1981
G. R. Blakley: One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist. IEEE Symposium on Security and Privacy (S&P), 1980
George I. Davida, Richard A. DeMillo, and Richard J. Lipton: A System Architecture to Support a Verifiably Secure Multilevel Security System. IEEE Symposium on Security and Privacy (S&P), 1980
Stanley R. Ames Jr. and James G. Keeton-Williams: Demonstrating Security for Trusted Applications on a Security Kernel Base. IEEE Symposium on Security and Privacy (S&P), 1980