This webpage is an attempt to assemble a ranking of top-cited security papers from the 1980s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.
Top-cited papers from 1989 ⌄
1
D. F. C. Brewer and Michael J. Nash: The Chinese Wall Security Policy. IEEE Symposium on Security and Privacy, 1989
Mark W. Eichin and Jon A. Rochlis: With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. IEEE Symposium on Security and Privacy, 1989
George I. Davida, Yvo Desmedt, and Brian J. Matt: Defending Systems against Viruses through Cryptographic Authentication. IEEE Symposium on Security and Privacy, 1989
Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, William R. Shockley, and Mark R. Heckman: The SeaView security model. IEEE Symposium on Security and Privacy, 1988
Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark R. Heckman, and William R. Shockley: A Multilevel Relational Data Model. IEEE Symposium on Security and Privacy, 1987
Chii-Ren Tsai, Virgil D. Gligor, and C. Sekar Chandersekaran: A Formal Method for the Identification of Covert Storage Channels in Source Code. IEEE Symposium on Security and Privacy, 1987
Tzong-An Su and Gultekin Özsoyoglu: Data Dependencies and Inference Control in Multilevel Relational Database Systems. IEEE Symposium on Security and Privacy, 1987
Andrew Birrell, Butler W. Lampson, Roger M. Needham, and Michael D. Schroeder: A Global Authentication Service without Global Trust. IEEE Symposium on Security and Privacy, 1986
John E. Dobson and Brian Randell: Building Reliable Secure Computing Systems out of Unreliable Insecure Components. IEEE Symposium on Security and Privacy, 1986
J. Thomas Haigh, Richard A. Kemmerer, John McHugh, and William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Symposium on Security and Privacy, 1986
J.-M. Fray, Yves Deswarte, and David Powell: Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. IEEE Symposium on Security and Privacy, 1986
Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, and N. Vasudevan: On the Design and the Implementation of Secure Xenix Workstations. IEEE Symposium on Security and Privacy, 1986
John McHugh and Andrew P. Moore: A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network. IEEE Symposium on Security and Privacy, 1986
S. A. Rajunas, Norman Hardy, Allen C. Bomberger, William S. Frantz, and Charles R. Landau: Security in KeyKOS™. IEEE Symposium on Security and Privacy, 1986
Deborah Downs, Jerzy R. Rub, Kenneth C. Kung, and Carole S. Jordan: Issues in Discretionary Access Control. IEEE Symposium on Security and Privacy, 1985
William Earl Boebert, R. Y. Kaln, William D. Young, and S. A. Hansohn: Secure Ada Target: Issues, System Design, and Verification. IEEE Symposium on Security and Privacy, 1985
G. R. Blakley and Catherine A. Meadows: A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data. IEEE Symposium on Security and Privacy, 1985
Richard D. Graubart and Kevin J. Duffy: Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS. IEEE Symposium on Security and Privacy, 1985
George W. Dinolt, Richard B. Neely, P. C. Baker, and James W. Freeman: Multinet Gateway-Towards A1 Certification. IEEE Symposium on Security and Privacy, 1984
Paul A. Karger and A. J. Herbert: An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. IEEE Symposium on Security and Privacy, 1984
M. Schaefer and Roger R. Schell: Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products. IEEE Symposium on Security and Privacy, 1984
John D. McLean, Carl E. Landwehr, and Constance L. Heitmeyer: A Formal Statement of the MMS Security Model. IEEE Symposium on Security and Privacy, 1984
Robert R. Jueneman, Stephen M. Matyas, and Carl H. Meyer: Message Authentication with Manipulation Detection Code. IEEE Symposium on Security and Privacy, 1983
C. A. Asmuth and G. R. Blakley: Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication. IEEE Symposium on Security and Privacy, 1982
Dorothy E. Denning, Jan Schlörer, and Elisabeth Wehrle: Memoryless Inference Controls for Statistical Databases. IEEE Symposium on Security and Privacy, 1982
David A. Bonyun: The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security. IEEE Symposium on Security and Privacy, 1981
G. R. Blakley: One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist. IEEE Symposium on Security and Privacy, 1980
George I. Davida, Richard A. DeMillo, and Richard J. Lipton: A System Architecture to Support a Verifiably Secure Multilevel Security System. IEEE Symposium on Security and Privacy, 1980
Stanley R. Ames Jr. and James G. Keeton-Williams: Demonstrating Security for Trusted Applications on a Security Kernel Base. IEEE Symposium on Security and Privacy, 1980