Security Papers from the 1980s

This webpage is an attempt to assemble a ranking of top-cited security papers from the 1980s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top-cited papers from 1989 ⌄

  1. 1
    D. F. C. Brewer and Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy (S&P), 1989
    1531 cites at Google Scholar
    2761% above average of year
    Visited: May-2025
    Paper: DOI
  2. 2
    Mark W. Eichin and Jon A. Rochlis:
    With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988.
    IEEE Symposium on Security and Privacy (S&P), 1989
    356 cites at Google Scholar
    565% above average of year
    Visited: May-2025
    Paper: DOI
  3. 3
    H. S. Vaccaro and Gunar E. Liepins:
    Detection of Anomalous Computer Session Activity.
    IEEE Symposium on Security and Privacy (S&P), 1989
    350 cites at Google Scholar
    554% above average of year
    Visited: May-2025
    Paper: DOI
  4. 4
    Li Gong:
    A Secure Identity-Based Capability System.
    IEEE Symposium on Security and Privacy (S&P), 1989
    335 cites at Google Scholar
    526% above average of year
    Visited: Jul-2025
    Paper: DOI
  5. 5
    Lein Harn, Yaw-Ruey Chien, and Thomas Kiesler:
    An extended cryptographic key generation scheme for multilevel data security.
    Annual Computer Security Applications Conference (ACSAC), 1989
    251 cites at Google Scholar
    369% above average of year
    Visited: Jun-2025
    Paper: DOI
  6. 6
    George I. Davida, Yvo Desmedt, and Brian J. Matt:
    Defending Systems against Viruses through Cryptographic Authentication.
    IEEE Symposium on Security and Privacy (S&P), 1989
    201 cites at Google Scholar
    276% above average of year
    Visited: Apr-2025
    Paper: DOI
  7. 7
    Tsau Young Lin:
    Chinese wall security policy-an aggressive model.
    Annual Computer Security Applications Conference (ACSAC), 1989
    159 cites at Google Scholar
    197% above average of year
    Visited: May-2025
    Paper: DOI
  8. 8
    Teresa F. Lunt:
    Aggregation and Inference: Facts and Fallacies.
    IEEE Symposium on Security and Privacy (S&P), 1989
    139 cites at Google Scholar
    160% above average of year
    Visited: Jun-2025
    Paper: DOI
  9. 9
    Jeremy Jacob:
    On the Derivation of Secure Components.
    IEEE Symposium on Security and Privacy (S&P), 1989
    112 cites at Google Scholar
    109% above average of year
    Visited: May-2025
    Paper: DOI
  10. 10
    Jonathan K. Millen:
    Finite-State Noiseless Covert Channels.
    IEEE Computer Security Foundations Symposium (CSF), 1989
    111 cites at Google Scholar
    107% above average of year
    Visited: May-2025
    Paper: DOI

Top-cited papers from 1988 ⌄

  1. 1
    Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, William R. Shockley, and Mark R. Heckman:
    The SeaView security model.
    IEEE Symposium on Security and Privacy (S&P), 1988
    485 cites at Google Scholar
    622% above average of year
    Visited: Jun-2025
    Paper: DOI
  2. 2
    Daryl McCullough:
    Noninterference and the composability of security properties.
    IEEE Symposium on Security and Privacy (S&P), 1988
    375 cites at Google Scholar
    459% above average of year
    Visited: Jul-2025
    Paper: DOI
  3. 3
    Thomas H. Hinke:
    Inference aggregation detection in database management systems.
    IEEE Symposium on Security and Privacy (S&P), 1988
    179 cites at Google Scholar
    167% above average of year
    Visited: Apr-2025
    Paper: DOI
  4. 4
    Matthew Morgenstern:
    Controlling logical inference in multilevel database systems.
    IEEE Symposium on Security and Privacy (S&P), 1988
    140 cites at Google Scholar
    109% above average of year
    Visited: Apr-2025
    Paper: DOI
  5. 5
    Theodore M. P. Lee:
    Using mandatory integrity to enforce 'commercial' security.
    IEEE Symposium on Security and Privacy (S&P), 1988
    136 cites at Google Scholar
    103% above average of year
    Visited: Jun-2025
    Paper: DOI
  6. 6
    Karen R. Sollins:
    Cascaded authentication.
    IEEE Symposium on Security and Privacy (S&P), 1988
    125 cites at Google Scholar
    86% above average of year
    Visited: May-2025
    Paper: DOI
  7. 7
    Mark K. Joseph and Algirdas Avizienis:
    A fault tolerance approach to computer viruses.
    IEEE Symposium on Security and Privacy (S&P), 1988
    121 cites at Google Scholar
    80% above average of year
    Visited: Jul-2025
    Paper: DOI
  8. 8
    John McLean:
    The algebra of security.
    IEEE Symposium on Security and Privacy (S&P), 1988
    116 cites at Google Scholar
    73% above average of year
    Visited: Jun-2025
    Paper: DOI
  9. 9
    P. Venkat Rangan:
    An axiomatic basis of trust in distributed systems.
    IEEE Symposium on Security and Privacy (S&P), 1988
    110 cites at Google Scholar
    64% above average of year
    Visited: May-2025
    Paper: DOI
  10. 10
    Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark R. Heckman, and Dan Warren:
    A near-term design for the SeaView multilevel database system.
    IEEE Symposium on Security and Privacy (S&P), 1988
    94 cites at Google Scholar
    40% above average of year
    Visited: May-2025
    Paper: DOI

Top-cited papers from 1987 ⌄

  1. 1
    David D. Clark and D. R. Wilson:
    A Comparison of Commercial and Military Computer Security Policies.
    IEEE Symposium on Security and Privacy (S&P), 1987
    2045 cites at Google Scholar
    1215% above average of year
    Visited: Apr-2025
    Paper: DOI
  2. 2
    Daryl McCullough:
    Specifications for Multi-Level Security and a Hook-Up Property.
    IEEE Symposium on Security and Privacy (S&P), 1987
    419 cites at Google Scholar
    170% above average of year
    Visited: Jul-2025
    Paper: DOI
  3. 3
    Jonathan K. Millen:
    Covert Channel Capacity.
    IEEE Symposium on Security and Privacy (S&P), 1987
    286 cites at Google Scholar
    84% above average of year
    Visited: Apr-2025
    Paper: DOI
  4. 4
    Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark R. Heckman, and William R. Shockley:
    A Multilevel Relational Data Model.
    IEEE Symposium on Security and Privacy (S&P), 1987
    263 cites at Google Scholar
    69% above average of year
    Visited: Apr-2025
    Paper: DOI
  5. 5
    Steve H. Weingart:
    Physical Security for the µABYSS System.
    IEEE Symposium on Security and Privacy (S&P), 1987
    154 cites at Google Scholar
    -1% below average of year
    Visited: Jul-2025
    Paper: DOI
  6. 6
    John McLean:
    Reasoning About Security Models.
    IEEE Symposium on Security and Privacy (S&P), 1987
    150 cites at Google Scholar
    -4% below average of year
    Visited: May-2025
    Paper: DOI
  7. 7
    Paul A. Karger:
    Limiting the Damage Potential of Discretionary Trojan Horses.
    IEEE Symposium on Security and Privacy (S&P), 1987
    115 cites at Google Scholar
    -26% below average of year
    Visited: Apr-2025
    Paper: DOI
  8. 8
    Chii-Ren Tsai, Virgil D. Gligor, and C. Sekar Chandersekaran:
    A Formal Method for the Identification of Covert Storage Channels in Source Code.
    IEEE Symposium on Security and Privacy (S&P), 1987
    112 cites at Google Scholar
    -28% below average of year
    Visited: Jul-2025
    Paper: DOI
  9. 9
    Tzong-An Su and Gultekin Özsoyoglu:
    Data Dependencies and Inference Control in Multilevel Relational Database Systems.
    IEEE Symposium on Security and Privacy (S&P), 1987
    70 cites at Google Scholar
    -55% below average of year
    Visited: Jul-2025
    Paper: DOI
  10. 10
    John P. L. Woodward:
    Exploiting the Dual Nature of Sensitivity Labels.
    IEEE Symposium on Security and Privacy (S&P), 1987
    58 cites at Google Scholar
    -63% below average of year
    Visited: Apr-2025
    Paper: DOI

Top-cited papers from 1986 ⌄

  1. 1
    Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, and Mark R. Heckman:
    Views for Multilevel Database Security.
    IEEE Symposium on Security and Privacy (S&P), 1986
    234 cites at Google Scholar
    319% above average of year
    Visited: Jul-2025
    Paper: DOI
  2. 2
    Andrew Birrell, Butler W. Lampson, Roger M. Needham, and Michael D. Schroeder:
    A Global Authentication Service without Global Trust.
    IEEE Symposium on Security and Privacy (S&P), 1986
    171 cites at Google Scholar
    206% above average of year
    Visited: May-2025
    Paper: DOI
  3. 3
    John E. Dobson and Brian Randell:
    Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
    IEEE Symposium on Security and Privacy (S&P), 1986
    118 cites at Google Scholar
    111% above average of year
    Visited: Apr-2025
    Paper: DOI
  4. 4
    J. Thomas Haigh, Richard A. Kemmerer, John McHugh, and William D. Young:
    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
    IEEE Symposium on Security and Privacy (S&P), 1986
    98 cites at Google Scholar
    76% above average of year
    Visited: May-2025
    Paper: DOI
  5. 5
    Richard Y. Kain and Carl E. Landwehr:
    On Access Checking in Capability-Based Systems.
    IEEE Symposium on Security and Privacy (S&P), 1986
    94 cites at Google Scholar
    68% above average of year
    Visited: May-2025
    Paper: DOI
  6. 6
    J.-M. Fray, Yves Deswarte, and David Powell:
    Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering.
    IEEE Symposium on Security and Privacy (S&P), 1986
    87 cites at Google Scholar
    56% above average of year
    Visited: Jul-2025
    Paper: DOI
  7. 7
    Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, and N. Vasudevan:
    On the Design and the Implementation of Secure Xenix Workstations.
    IEEE Symposium on Security and Privacy (S&P), 1986
    56 cites at Google Scholar
    0% above average of year
    Visited: May-2025
    Paper: DOI
  8. 8
    Dan M. Nessett:
    Factors Affecting Distributed System Security.
    IEEE Symposium on Security and Privacy (S&P), 1986
    49 cites at Google Scholar
    -12% below average of year
    Visited: Jun-2025
    Paper: DOI
  9. 9
    Norman S. Matloff:
    Another Look at the Use of Noise Addition for Database Security.
    IEEE Symposium on Security and Privacy (S&P), 1986
    47 cites at Google Scholar
    -16% below average of year
    Visited: Apr-2025
    Paper: DOI
  10. 10
    John McHugh and Andrew P. Moore:
    A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network.
    IEEE Symposium on Security and Privacy (S&P), 1986
    43 cites at Google Scholar
    -23% below average of year
    Visited: May-2025
    Paper: DOI

Top-cited papers from 1985 ⌄

  1. 1
    Deborah Downs, Jerzy R. Rub, Kenneth C. Kung, and Carole S. Jordan:
    Issues in Discretionary Access Control.
    IEEE Symposium on Security and Privacy (S&P), 1985
    198 cites at Google Scholar
    443% above average of year
    Visited: May-2025
    Paper: DOI
  2. 2
    Dorothy E. Denning:
    Commutative Filters for Reducing Inference Threats in Multilevel Database Systems.
    IEEE Symposium on Security and Privacy (S&P), 1985
    110 cites at Google Scholar
    202% above average of year
    Visited: Jun-2025
    Paper: DOI
  3. 3
    Tatsuski Okamoto and Akira Shibaishi:
    A Fast Signature Scheme Based on Quadratic Inequalities.
    IEEE Symposium on Security and Privacy (S&P), 1985
    66 cites at Google Scholar
    81% above average of year
    Visited: May-2025
    Paper: DOI
  4. 4
    William Earl Boebert, R. Y. Kaln, William D. Young, and S. A. Hansohn:
    Secure Ada Target: Issues, System Design, and Verification.
    IEEE Symposium on Security and Privacy (S&P), 1985
    66 cites at Google Scholar
    81% above average of year
    Visited: Apr-2025
    Paper: DOI
  5. 5
    Gustavus J. Simmons:
    How to (Selectively) Broadcast A Secret.
    IEEE Symposium on Security and Privacy (S&P), 1985
    55 cites at Google Scholar
    51% above average of year
    Visited: Apr-2025
    Paper: DOI
  6. 6
    Stephen T. Walker:
    Network Security Overview.
    IEEE Symposium on Security and Privacy (S&P), 1985
    54 cites at Google Scholar
    48% above average of year
    Visited: May-2025
    Paper: DOI
  7. 7
    G. R. Blakley and Catherine Meadows:
    A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
    IEEE Symposium on Security and Privacy (S&P), 1985
    39 cites at Google Scholar
    7% above average of year
    Visited: May-2025
    Paper: DOI
  8. 8
    Richard D. Graubart and Kevin J. Duffy:
    Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS.
    IEEE Symposium on Security and Privacy (S&P), 1985
    32 cites at Google Scholar
    -12% below average of year
    Visited: May-2025
    Paper: DOI
  9. 9
    James P. Anderson:
    A Unification of Computer and Network Security Concepts.
    IEEE Symposium on Security and Privacy (S&P), 1985
    30 cites at Google Scholar
    -18% below average of year
    Visited: May-2025
    Paper: DOI
  10. 10
    Raymond M. Wong, Thomas A. Berson, and Richard J. Feiertag:
    Polonium: An Identity Authentication System.
    IEEE Symposium on Security and Privacy (S&P), 1985
    29 cites at Google Scholar
    -21% below average of year
    Visited: Apr-2025
    Paper: DOI

Top-cited papers from 1984 ⌄

  1. 1
    Joseph A. Goguen and José Meseguer:
    Unwinding and Inference Control.
    IEEE Symposium on Security and Privacy (S&P), 1984
    645 cites at Google Scholar
    1029% above average of year
    Visited: May-2025
    Paper: DOI
  2. 2
    Paul A. Karger and A. J. Herbert:
    An Augmented Capability Architecture to Support Lattice Security and Traceability of Access.
    IEEE Symposium on Security and Privacy (S&P), 1984
    117 cites at Google Scholar
    105% above average of year
    Visited: May-2025
    Paper: DOI
  3. 3
    Dorothy E. Denning:
    Cryptographic Checksums for Multilevel Database Security.
    IEEE Symposium on Security and Privacy (S&P), 1984
    110 cites at Google Scholar
    93% above average of year
    Visited: Jun-2025
    Paper: DOI
  4. 4
    Jonathan K. Millen:
    The Interrogator: A Tool for Cryptographic Protocol Security.
    IEEE Symposium on Security and Privacy (S&P), 1984
    82 cites at Google Scholar
    44% above average of year
    Visited: May-2025
    Paper: DOI
  5. 5
    Richard D. Graubart:
    The Integrity-Lock Approach to Secure Database Management.
    IEEE Symposium on Security and Privacy (S&P), 1984
    61 cites at Google Scholar
    7% above average of year
    Visited: Jun-2025
    Paper: DOI
  6. 6
    David Chaum:
    A New Paradigm for Individuals in the Information Age.
    IEEE Symposium on Security and Privacy (S&P), 1984
    49 cites at Google Scholar
    -14% below average of year
    Visited: May-2025
    Paper: DOI
  7. 7
    M. Schaefer and Roger R. Schell:
    Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products.
    IEEE Symposium on Security and Privacy (S&P), 1984
    33 cites at Google Scholar
    -42% below average of year
    Visited: Jul-2025
    Paper: DOI
  8. 8
    S. Kramer:
    Linus IV : An Experiment in Computer Security.
    IEEE Symposium on Security and Privacy (S&P), 1984
    28 cites at Google Scholar
    -51% below average of year
    Visited: May-2025
    Paper: DOI
  9. 9
    John D. McLean, Carl E. Landwehr, and Constance L. Heitmeyer:
    A Formal Statement of the MMS Security Model.
    IEEE Symposium on Security and Privacy (S&P), 1984
    23 cites at Google Scholar
    -60% below average of year
    Visited: May-2025
    Paper: DOI
  10. 10
    Neal R. Wagner:
    Searching for Public-Key Cryptosystems.
    IEEE Symposium on Security and Privacy (S&P), 1984
    19 cites at Google Scholar
    -67% below average of year
    Visited: May-2025
    Paper: DOI

Top-cited papers from 1983 ⌄

  1. 1
    John M. Rushby and Brian Randell:
    A Distributed Secure System.
    IEEE Symposium on Security and Privacy (S&P), 1983
    198 cites at Google Scholar
    808% above average of year
    Visited: May-2025
    Paper: DOI
  2. 2
    Gustavus J. Simmons:
    Verification of Treaty Compliance Revisited.
    IEEE Symposium on Security and Privacy (S&P), 1983
    46 cites at Google Scholar
    111% above average of year
    Visited: Jul-2025
    Paper: DOI
  3. 3
    Subhash C. Kak:
    Joint Encryption and Error-Correction Coding.
    IEEE Symposium on Security and Privacy (S&P), 1983
    26 cites at Google Scholar
    19% above average of year
    Visited: May-2025
    Paper: DOI
  4. 4
    Billy G. Claybrook:
    Using Views in a Multilevel Secure Database Management System.
    IEEE Symposium on Security and Privacy (S&P), 1983
    24 cites at Google Scholar
    10% above average of year
    Visited: Jul-2025
    Paper: DOI
  5. 5
    Stephen J. MacKinnon and Selim G. Akl:
    New Key Generation Algorithms for Multilevel Security.
    IEEE Symposium on Security and Privacy (S&P), 1983
    19 cites at Google Scholar
    -13% below average of year
    Visited: May-2025
    Paper: DOI
  6. 6
    Roger R. Schell:
    Evaluating Security Properties of Computer Systems.
    IEEE Symposium on Security and Privacy (S&P), 1983
    9 cites at Google Scholar
    -59% below average of year
    Visited: Jun-2025
    Paper: DOI
  7. 7
    K. A. Omar and David L. Wells:
    Modified Architecture for the Sub-Keys Model.
    IEEE Symposium on Security and Privacy (S&P), 1983
    7 cites at Google Scholar
    -68% below average of year
    Visited: Jul-2025
    Paper: DOI
  8. 8
    Brian Marick:
    The VERUS Design Verification System.
    IEEE Symposium on Security and Privacy (S&P), 1983
    6 cites at Google Scholar
    -72% below average of year
    Visited: May-2025
    Paper: DOI
  9. 9
    Thomas H. Hinke, Jose Althouse, and Richard A. Kemmerer:
    SDC Secure Release Terminal Project.
    IEEE Symposium on Security and Privacy (S&P), 1983
    6 cites at Google Scholar
    -72% below average of year
    Visited: Apr-2025
    Paper: DOI
  10. 10
    Dorothy E. Denning:
    The Many-Time Pad: Theme and Variations.
    IEEE Symposium on Security and Privacy (S&P), 1983
    5 cites at Google Scholar
    -77% below average of year
    Visited: May-2025
    Paper: DOI

Top-cited papers from 1982 ⌄

  1. 1
    Joseph A. Goguen and José Meseguer:
    Security Policies and Security Models.
    IEEE Symposium on Security and Privacy (S&P), 1982
    3210 cites at Google Scholar
    1402% above average of year
    Visited: Jun-2025
    Paper: DOI
  2. 2
    Steven B. Lipner:
    Non-Discretionery Controls for Commercial Applications.
    IEEE Symposium on Security and Privacy (S&P), 1982
    179 cites at Google Scholar
    -16% below average of year
    Visited: May-2025
    Paper: DOI
  3. 3
    Richard A. Kemmerer:
    A Practical Approach to Identifying Storage and Timing Channels.
    IEEE Symposium on Security and Privacy (S&P), 1982
    46 cites at Google Scholar
    -78% below average of year
    Visited: Jul-2025
    Paper: DOI
  4. 4
    C. A. Asmuth and G. R. Blakley:
    Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication.
    IEEE Symposium on Security and Privacy (S&P), 1982
    40 cites at Google Scholar
    -81% below average of year
    Visited: May-2025
    Paper: DOI
  5. 5
    Richard D. Graubart and John P. L. Woodward:
    A Preliminary Neval Surveillance OBMS Sacurity.
    IEEE Symposium on Security and Privacy (S&P), 1982
    38 cites at Google Scholar
    -82% below average of year
    Visited: Apr-2025
    Paper: DOI
  6. 6
    Dorothy E. Denning, Jan Schlörer, and Elisabeth Wehrle:
    Memoryless Inference Controls for Statistical Databases.
    IEEE Symposium on Security and Privacy (S&P), 1982
    31 cites at Google Scholar
    -85% below average of year
    Visited: Jun-2025
    Paper: DOI
  7. 7
    Gustavus J. Simmons and Diane B. Holdridge:
    Forward Search as a Cryptanalytic Tool Against a Public Key.
    IEEE Symposium on Security and Privacy (S&P), 1982
    27 cites at Google Scholar
    -87% below average of year
    Visited: May-2025
    Paper: DOI
  8. 8
    Deepinder P. Sidhu and Morrie Gasser:
    A Multilevel Secure Local Area Network.
    IEEE Symposium on Security and Privacy (S&P), 1982
    22 cites at Google Scholar
    -90% below average of year
    Visited: Jun-2025
    Paper: DOI
  9. 9
    George I. Davida and Yi-Shiung Yeh:
    Cryptographic Relational Algebra.
    IEEE Symposium on Security and Privacy (S&P), 1982
    13 cites at Google Scholar
    -94% below average of year
    Visited: May-2025
    Paper: DOI
  10. 10
    Selim G. Akl:
    Digital Signitures with Blindfolded Arbitrators Who Cannot Form Alliances.
    IEEE Symposium on Security and Privacy (S&P), 1982
    8 cites at Google Scholar
    -96% below average of year
    Visited: May-2025
    Paper: DOI

Top-cited papers from 1981 ⌄

  1. 1
    Lawrence J. Shirley and Roger R. Schell:
    Mechanism Sufficiency Validation by Assignment.
    IEEE Symposium on Security and Privacy (S&P), 1981
    43 cites at Google Scholar
    122% above average of year
    Visited: Jun-2025
    Paper: DOI
  2. 2
    Allen Stoughton:
    Access Flow: A Protection Model which Integrates Access Control and Information Flow.
    IEEE Symposium on Security and Privacy (S&P), 1981
    43 cites at Google Scholar
    122% above average of year
    Visited: May-2025
    Paper: DOI
  3. 3
    Jonathan K. Millen:
    Information Flow Analysis of Formal Specifications.
    IEEE Symposium on Security and Privacy (S&P), 1981
    34 cites at Google Scholar
    75% above average of year
    Visited: Jun-2025
    Paper: DOI
  4. 4
    G. R. Blakley and Laif Swanson:
    Security Proofs for Information Protection Systems.
    IEEE Symposium on Security and Privacy (S&P), 1981
    34 cites at Google Scholar
    75% above average of year
    Visited: Apr-2025
    Paper: DOI
  5. 5
    Luke C. Dion:
    A Complete Protection Model.
    IEEE Symposium on Security and Privacy (S&P), 1981
    33 cites at Google Scholar
    70% above average of year
    Visited: Apr-2025
    Paper: DOI
  6. 6
    Daniel J. Solomon:
    Processing Multilevel Secure Objects.
    IEEE Symposium on Security and Privacy (S&P), 1981
    32 cites at Google Scholar
    65% above average of year
    Visited: May-2025
    Paper: DOI
  7. 7
    Stanley R. Ames Jr.:
    Security Kernels: A Solution or a Problem?
    IEEE Symposium on Security and Privacy (S&P), 1981
    22 cites at Google Scholar
    13% above average of year
    Visited: May-2025
    Paper: DOI
  8. 8
    David A. Bonyun:
    The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security.
    IEEE Symposium on Security and Privacy (S&P), 1981
    15 cites at Google Scholar
    -23% below average of year
    Visited: Jun-2025
    Paper: DOI
  9. 9
    Dorothy E. Denning:
    Restriciting Queries that Might Lead to Compromise.
    IEEE Symposium on Security and Privacy (S&P), 1981
    13 cites at Google Scholar
    -33% below average of year
    Visited: Jul-2025
    Paper: DOI
  10. 10
    Margaret S. Wu:
    Hierarchical Protection Systems.
    IEEE Symposium on Security and Privacy (S&P), 1981
    11 cites at Google Scholar
    -43% below average of year
    Visited: Jun-2025
    Paper: DOI

Top-cited papers from 1980 ⌄

  1. 1
    Ralph C. Merkle:
    Protocols for Public Key Cryptosystems.
    IEEE Symposium on Security and Privacy (S&P), 1980
    2392 cites at Google Scholar
    1223% above average of year
    Visited: Jun-2025
    Paper: DOI
  2. 2
    Steven P. Reiss:
    Practical Data-Swapping: The First Steps.
    IEEE Symposium on Security and Privacy (S&P), 1980
    198 cites at Google Scholar
    10% above average of year
    Visited: May-2025
    Paper: DOI
  3. 3
    G. R. Blakley:
    One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist.
    IEEE Symposium on Security and Privacy (S&P), 1980
    57 cites at Google Scholar
    -68% below average of year
    Visited: Jun-2025
    Paper: DOI
  4. 4
    George I. Davida, Richard A. DeMillo, and Richard J. Lipton:
    A System Architecture to Support a Verifiably Secure Multilevel Security System.
    IEEE Symposium on Security and Privacy (S&P), 1980
    14 cites at Google Scholar
    -92% below average of year
    Visited: May-2025
    Paper: DOI
  5. 5
    Adi Shamir:
    The Cryptographic Security of Compact Knapsacks (Preliminary Report).
    IEEE Symposium on Security and Privacy (S&P), 1980
    11 cites at Google Scholar
    -94% below average of year
    Visited: Jun-2025
    Paper: DOI
  6. 6
    S. M. Miranda:
    Aspects of Data Security in General-Purpose Data Base Management Systems.
    IEEE Symposium on Security and Privacy (S&P), 1980
    9 cites at Google Scholar
    -95% below average of year
    Visited: May-2025
    Paper: DOI
  7. 7
    Lishing Liu:
    On Security Flow Analysis in Computer Systems (Preliminary Report).
    IEEE Symposium on Security and Privacy (S&P), 1980
    6 cites at Google Scholar
    -97% below average of year
    Visited: Jul-2025
    Paper: DOI
  8. 8
    Gustavus J. Simmons:
    Secure Communications in the Presence of Pervasive Deceit.
    IEEE Symposium on Security and Privacy (S&P), 1980
    6 cites at Google Scholar
    -97% below average of year
    Visited: Apr-2025
    Paper: DOI
  9. 9
    Stanley R. Ames Jr. and James G. Keeton-Williams:
    Demonstrating Security for Trusted Applications on a Security Kernel Base.
    IEEE Symposium on Security and Privacy (S&P), 1980
    4 cites at Google Scholar
    -98% below average of year
    Visited: Jun-2025
    Paper: DOI
  10. 10
    P. Tucker Withington:
    The Trusted Function in Secure Decentralized Processing.
    IEEE Symposium on Security and Privacy (S&P), 1980
    3 cites at Google Scholar
    -98% below average of year
    Visited: Apr-2025
    Paper: DOI