Security Papers from the 1980s

This webpage is an attempt to assemble a ranking of top-cited security papers from the 1980s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top-cited papers from 1989 ⌄

  1. 1
    D. F. C. Brewer, Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy, 1989
    1301 cites at Google Scholar
    2636% above average of year
    Last visited: Jan-2018
  2. 2
    Mark W. Eichin, Jon A. Rochlis:
    With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988.
    IEEE Symposium on Security and Privacy, 1989
    308 cites at Google Scholar
    548% above average of year
    Last visited: Mar-2018
  3. 3
    H. S. Vaccaro, Gunar E. Liepins:
    Detection of Anomalous Computer Session Activity.
    IEEE Symposium on Security and Privacy, 1989
    272 cites at Google Scholar
    472% above average of year
    Last visited: Mar-2018
  4. 4
    Li Gong:
    A Secure Identity-Based Capability System.
    IEEE Symposium on Security and Privacy, 1989
    233 cites at Google Scholar
    390% above average of year
    Last visited: Mar-2018
  5. 5
    George I. Davida, Yvo Desmedt, Brian J. Matt:
    Defending Systems against Viruses through Cryptographic Authentication.
    IEEE Symposium on Security and Privacy, 1989
    171 cites at Google Scholar
    260% above average of year
    Last visited: Mar-2018
  6. 6
    Tsau Young Lin:
    Chinese wall security policy-an aggressive model.
    Annual Computer Security Applications Conference (ACSAC), 1989
    156 cites at Google Scholar
    228% above average of year
    Last visited: Jan-2018
  7. 7
    Teresa F. Lunt:
    Aggregation and Inference: Facts and Fallacies.
    IEEE Symposium on Security and Privacy, 1989
    126 cites at Google Scholar
    165% above average of year
    Last visited: Oct-2017
  8. 8
    J. Jacob:
    On the Derivation of Secure Components.
    IEEE Symposium on Security and Privacy, 1989
    100 cites at Google Scholar
    110% above average of year
    Last visited: Mar-2018
  9. 9
    Steven J. Reynolds, T. P. Grove Jr., John N. Parringin:
    Human issues.
    Annual Computer Security Applications Conference (ACSAC), 1989
    85 cites at Google Scholar
    79% above average of year
    Last visited: Jan-2018
  10. 10
    Catherine A. Meadows:
    Using Narrowing in the Analysis of Key Management Protocols.
    IEEE Symposium on Security and Privacy, 1989
    83 cites at Google Scholar
    75% above average of year
    Last visited: Mar-2018

Top-cited papers from 1988 ⌄

  1. 1
    Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark Heckman:
    The SeaView security model.
    IEEE Symposium on Security and Privacy, 1988
    448 cites at Google Scholar
    350% above average of year
    Last visited: Apr-2018
  2. 2
    Daryl McCullough:
    Noninterference and the composability of security properties.
    IEEE Symposium on Security and Privacy, 1988
    280 cites at Google Scholar
    181% above average of year
    Last visited: Jan-2018
  3. 3
    Teresa F. Lunt, R. Jagannathan:
    A prototype real-time intrusion-detection expert system.
    IEEE Symposium on Security and Privacy, 1988
    260 cites at Google Scholar
    161% above average of year
    Last visited: Apr-2018
  4. 4
    Thomas H. Hinke:
    Inference aggregation detection in database management systems.
    IEEE Symposium on Security and Privacy, 1988
    149 cites at Google Scholar
    50% above average of year
    Last visited: Jan-2018
  5. 5
    Theodore M. P. Lee:
    Using mandatory integrity to enforce 'commercial' security.
    IEEE Symposium on Security and Privacy, 1988
    130 cites at Google Scholar
    31% above average of year
    Last visited: Jan-2018
  6. 6
    Matthew Morgenstern:
    Controlling logical inference in multilevel database systems.
    IEEE Symposium on Security and Privacy, 1988
    125 cites at Google Scholar
    26% above average of year
    Last visited: Feb-2018
  7. 7
    Karen R. Sollins:
    Cascaded authentication.
    IEEE Symposium on Security and Privacy, 1988
    114 cites at Google Scholar
    15% above average of year
    Last visited: Apr-2018
  8. 8
    John McLean:
    The algebra of security.
    IEEE Symposium on Security and Privacy, 1988
    100 cites at Google Scholar
    1% above average of year
    Last visited: Mar-2018
  9. 9
    Mark K. Joseph, Algirdas Avizienis:
    A fault tolerance approach to computer viruses.
    IEEE Symposium on Security and Privacy, 1988
    97 cites at Google Scholar
    -3% below average of year
    Last visited: Mar-2018
  10. 10
    P. Venkat Rangan:
    An axiomatic basis of trust in distributed systems.
    IEEE Symposium on Security and Privacy, 1988
    95 cites at Google Scholar
    -5% below average of year
    Last visited: Mar-2018

Top-cited papers from 1987 ⌄

  1. 1
    D. D. Clark, D. R. Wilson:
    A Comparison of Commercial and Military Computer Security Policies.
    IEEE Symposium on Security and Privacy, 1987
    1726 cites at Google Scholar
    1136% above average of year
    Last visited: Jan-2018
  2. 2
    Daryl McCullough:
    Specifications for Multi-Level Security and a Hook-Up Property.
    IEEE Symposium on Security and Privacy, 1987
    355 cites at Google Scholar
    154% above average of year
    Last visited: Feb-2018
  3. 3
    Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark Heckman, William R. Shockley:
    A Multilevel Relational Data Model.
    IEEE Symposium on Security and Privacy, 1987
    250 cites at Google Scholar
    79% above average of year
    Last visited: Oct-2017
  4. 4
    Jonathan K. Millen:
    Covert Channel Capacity.
    IEEE Symposium on Security and Privacy, 1987
    239 cites at Google Scholar
    71% above average of year
    Last visited: Mar-2018
  5. 5
    Steve R. White, Liam Comerford:
    ABYSS: A Trusted Architecture for Software Protection.
    IEEE Symposium on Security and Privacy, 1987
    161 cites at Google Scholar
    15% above average of year
    Last visited: Feb-2018
  6. 6
    Steve H. Weingart:
    Physical Security for the µABYSS System.
    IEEE Symposium on Security and Privacy, 1987
    134 cites at Google Scholar
    -4% below average of year
    Last visited: Dec-2017
  7. 7
    John McLean:
    Reasoning About Security Models.
    IEEE Symposium on Security and Privacy, 1987
    126 cites at Google Scholar
    -10% below average of year
    Last visited: Nov-2017
  8. 8
    Paul A. Karger:
    Limiting the Damage Potential of Discretionary Trojan Horses.
    IEEE Symposium on Security and Privacy, 1987
    97 cites at Google Scholar
    -31% below average of year
    Last visited: Mar-2018
  9. 9
    Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran:
    A Formal Method for the Identification of Covert Storage Channels in Source Code.
    IEEE Symposium on Security and Privacy, 1987
    92 cites at Google Scholar
    -34% below average of year
    Last visited: Mar-2018
  10. 10
    Tzong-An Su, Gultekin Özsoyoglu:
    Data Dependencies and Inference Control in Multilevel Relational Database Systems.
    IEEE Symposium on Security and Privacy, 1987
    58 cites at Google Scholar
    -58% below average of year
    Last visited: Dec-2017

Top-cited papers from 1986 ⌄

  1. 1
    Dorothy E. Denning:
    An Intrusion-Detection Model.
    IEEE Symposium on Security and Privacy, 1986
    4559 cites at Google Scholar
    1712% above average of year
    Last visited: Feb-2018
  2. 2
    J. Thomas Haigh, William D. Young:
    Extending the Non-Interference Version of MLS for SAT.
    IEEE Symposium on Security and Privacy, 1986
    183 cites at Google Scholar
    -27% below average of year
    Last visited: Mar-2018
  3. 3
    Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman:
    Views for Multilevel Database Security.
    IEEE Symposium on Security and Privacy, 1986
    177 cites at Google Scholar
    -30% below average of year
    Last visited: Mar-2018
  4. 4
    Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder:
    A Global Authentication Service without Global Trust.
    IEEE Symposium on Security and Privacy, 1986
    155 cites at Google Scholar
    -38% below average of year
    Last visited: Dec-2017
  5. 5
    John E. Dobson, Brian Randell:
    Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
    IEEE Symposium on Security and Privacy, 1986
    96 cites at Google Scholar
    -62% below average of year
    Last visited: Feb-2018
  6. 6
    J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
    IEEE Symposium on Security and Privacy, 1986
    84 cites at Google Scholar
    -67% below average of year
    Last visited: Feb-2018
  7. 7
    J.-M. Fray, Yves Deswarte, David Powell:
    Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering.
    IEEE Symposium on Security and Privacy, 1986
    83 cites at Google Scholar
    -67% below average of year
    Last visited: Mar-2018
  8. 8
    Richard Y. Kain, Carl E. Landwehr:
    On Access Checking in Capability-Based Systems.
    IEEE Symposium on Security and Privacy, 1986
    78 cites at Google Scholar
    -69% below average of year
    Last visited: Jan-2018
  9. 9
    Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan:
    On the Design and the Implementation of Secure Xenix Workstations.
    IEEE Symposium on Security and Privacy, 1986
    53 cites at Google Scholar
    -79% below average of year
    Last visited: Dec-2017
  10. 10
    Dan M. Nessett:
    Factors Affecting Distributed System Security.
    IEEE Symposium on Security and Privacy, 1986
    43 cites at Google Scholar
    -83% below average of year
    Last visited: Jan-2018

Top-cited papers from 1985 ⌄

  1. 1
    Deborah Downs, Jerzy R. Rub, Kenneth C. Kung, Carole S. Jordan:
    Issues in Discretionary Access Control.
    IEEE Symposium on Security and Privacy, 1985
    97 cites at Google Scholar
    261% above average of year
    Last visited: Mar-2018
  2. 2
    Dorothy E. Denning:
    Commutative Filters for Reducing Inference Threats in Multilevel Database Systems.
    IEEE Symposium on Security and Privacy, 1985
    88 cites at Google Scholar
    227% above average of year
    Last visited: Jan-2018
  3. 3
    W. E. Boebert, R. Y. Kaln, William D. Young, S. A. Hansohn:
    Secure Ada Target: Issues, System Design, and Verification.
    IEEE Symposium on Security and Privacy, 1985
    57 cites at Google Scholar
    112% above average of year
    Last visited: Apr-2018
  4. 4
    Gustavus J. Simmons:
    How to (Selectively) Broadcast A Secret.
    IEEE Symposium on Security and Privacy, 1985
    54 cites at Google Scholar
    101% above average of year
    Last visited: Apr-2018
  5. 5
    Tatsuski Okamoto, Akira Shibaishi:
    A Fast Signature Scheme Based on Quadratic Inequalities.
    IEEE Symposium on Security and Privacy, 1985
    52 cites at Google Scholar
    93% above average of year
    Last visited: Jan-2018
  6. 6
    Stephen T. Walker:
    Network Security Overview.
    IEEE Symposium on Security and Privacy, 1985
    44 cites at Google Scholar
    64% above average of year
    Last visited: Apr-2018
  7. 7
    G. R. Blakley, Catherine A. Meadows:
    A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
    IEEE Symposium on Security and Privacy, 1985
    32 cites at Google Scholar
    19% above average of year
    Last visited: Nov-2017
  8. 8
    Robert W. Baldwin, Wayne Gramlich:
    Cryptographic Protocol for Trustable Match Making.
    IEEE Symposium on Security and Privacy, 1985
    32 cites at Google Scholar
    19% above average of year
    Last visited: Mar-2018
  9. 9
    John McHugh, Donald L. Good:
    An Information Flow Tool for Gypsy.
    IEEE Symposium on Security and Privacy, 1985
    28 cites at Google Scholar
    4% above average of year
    Last visited: Dec-2017
  10. 10
    Richard D. Graubart, Kevin J. Duffy:
    Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS.
    IEEE Symposium on Security and Privacy, 1985
    25 cites at Google Scholar
    -7% below average of year
    Last visited: Mar-2018

Top-cited papers from 1984 ⌄

  1. 1
    Joseph A. Goguen, José Meseguer:
    Unwinding and Inference Control.
    IEEE Symposium on Security and Privacy, 1984
    480 cites at Google Scholar
    826% above average of year
    Last visited: Feb-2018
  2. 2
    Robert S. Winternitz:
    A Secure One-Way Hash Function Built from DES.
    IEEE Symposium on Security and Privacy, 1984
    123 cites at Google Scholar
    137% above average of year
    Last visited: Jan-2018
  3. 3
    Paul A. Karger, A. J. Herbert:
    An Augmented Capability Architecture to Support Lattice Security and Traceability of Access.
    IEEE Symposium on Security and Privacy, 1984
    100 cites at Google Scholar
    93% above average of year
    Last visited: Mar-2018
  4. 4
    Dorothy E. Denning:
    Cryptographic Checksums for Multilevel Database Security.
    IEEE Symposium on Security and Privacy, 1984
    97 cites at Google Scholar
    87% above average of year
    Last visited: Feb-2018
  5. 5
    Jonathan K. Millen:
    The Interrogator: A Tool for Cryptographic Protocol Security.
    IEEE Symposium on Security and Privacy, 1984
    87 cites at Google Scholar
    68% above average of year
    Last visited: Apr-2018
  6. 6
    Richard D. Graubart:
    The Integrity-Lock Approach to Secure Database Management.
    IEEE Symposium on Security and Privacy, 1984
    49 cites at Google Scholar
    -5% below average of year
    Last visited: Mar-2018
  7. 7
    David Chaum:
    A New Paradigm for Individuals in the Information Age.
    IEEE Symposium on Security and Privacy, 1984
    45 cites at Google Scholar
    -13% below average of year
    Last visited: Mar-2018
  8. 8
    M. Schaefer, Roger R. Schell:
    Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products.
    IEEE Symposium on Security and Privacy, 1984
    28 cites at Google Scholar
    -46% below average of year
    Last visited: Feb-2018
  9. 9
    S. Kramer:
    Linus IV : An Experiment in Computer Security.
    IEEE Symposium on Security and Privacy, 1984
    25 cites at Google Scholar
    -52% below average of year
    Last visited: Mar-2018
  10. 10
    John D. McLean, Carl E. Landwehr, Constance L. Heitmeyer:
    A Formal Statement of the MMS Security Model.
    IEEE Symposium on Security and Privacy, 1984
    19 cites at Google Scholar
    -63% below average of year
    Last visited: Feb-2018

Top-cited papers from 1983 ⌄

  1. 1
    Neal R. Wagner:
    Fingerprinting.
    IEEE Symposium on Security and Privacy, 1983
    260 cites at Google Scholar
    529% above average of year
    Last visited: Feb-2018
  2. 2
    John M. Rushby, Brian Randell:
    A Distributed Secure System.
    IEEE Symposium on Security and Privacy, 1983
    182 cites at Google Scholar
    340% above average of year
    Last visited: Mar-2018
  3. 3
    Virgil D. Gligor:
    A Note on the Denial-of-Service Problem.
    IEEE Symposium on Security and Privacy, 1983
    110 cites at Google Scholar
    166% above average of year
    Last visited: Apr-2018
  4. 4
    Robert R. Jueneman, Stephen M. Matyas, Carl H. Meyer:
    Message Authentication with Manipulation Detection Code.
    IEEE Symposium on Security and Privacy, 1983
    54 cites at Google Scholar
    31% above average of year
    Last visited: Mar-2018
  5. 5
    Bahaa W. Fam, Jonathan K. Millen:
    The Channel Assignment Problem.
    IEEE Symposium on Security and Privacy, 1983
    46 cites at Google Scholar
    11% above average of year
    Last visited: Mar-2018
  6. 6
    Gustavus J. Simmons:
    Verification of Treaty Compliance Revisited.
    IEEE Symposium on Security and Privacy, 1983
    45 cites at Google Scholar
    9% above average of year
    Last visited: Feb-2018
  7. 7
    Billy G. Claybrook:
    Using Views in a Multilevel Secure Database Management System.
    IEEE Symposium on Security and Privacy, 1983
    25 cites at Google Scholar
    -40% below average of year
    Last visited: Jan-2018
  8. 8
    Subhash C. Kak:
    Joint Encryption and Error-Correction Coding.
    IEEE Symposium on Security and Privacy, 1983
    21 cites at Google Scholar
    -49% below average of year
    Last visited: Mar-2018
  9. 9
    Stephen J. MacKinnon, Selim G. Akl:
    New Key Generation Algorithms for Multilevel Security.
    IEEE Symposium on Security and Privacy, 1983
    16 cites at Google Scholar
    -61% below average of year
    Last visited: Mar-2018
  10. 10
    David Elliott Bell:
    Secure Computer Systems: A Retrospective.
    IEEE Symposium on Security and Privacy, 1983
    12 cites at Google Scholar
    -71% below average of year
    Last visited: Feb-2018

Top-cited papers from 1982 ⌄

  1. 1
    Joseph A. Goguen, José Meseguer:
    Security Policies and Security Models.
    IEEE Symposium on Security and Privacy, 1982
    2294 cites at Google Scholar
    1225% above average of year
    Last visited: Mar-2018
  2. 2
    Steven B. Lipner:
    Non-Discretionery Controls for Commercial Applications.
    IEEE Symposium on Security and Privacy, 1982
    154 cites at Google Scholar
    -11% below average of year
    Last visited: Dec-2017
  3. 3
    Richard A. Kemmerer:
    A Practical Approach to Identifying Storage and Timing Channels.
    IEEE Symposium on Security and Privacy, 1982
    89 cites at Google Scholar
    -49% below average of year
    Last visited: Apr-2018
  4. 4
    George B. Purdy, Gustavus J. Simmons, James Studier:
    A Software Protection Scheme.
    IEEE Symposium on Security and Privacy, 1982
    50 cites at Google Scholar
    -71% below average of year
    Last visited: Feb-2018
  5. 5
    C. A. Asmuth, G. R. Blakley:
    Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication.
    IEEE Symposium on Security and Privacy, 1982
    38 cites at Google Scholar
    -78% below average of year
    Last visited: Mar-2018
  6. 6
    Richard D. Graubart, John P. L. Woodward:
    A Preliminary Neval Surveillance OBMS Sacurity.
    IEEE Symposium on Security and Privacy, 1982
    33 cites at Google Scholar
    -81% below average of year
    Last visited: Feb-2018
  7. 7
    Dorothy E. Denning, Jan Schlörer, Elisabeth Wehrle:
    Memoryless Inference Controls for Statistical Databases.
    IEEE Symposium on Security and Privacy, 1982
    28 cites at Google Scholar
    -84% below average of year
    Last visited: Mar-2018
  8. 8
    Gustavus J. Simmons, Diane B. Holdridge:
    Forward Search as a Cryptanalytic Tool Against a Public Key.
    IEEE Symposium on Security and Privacy, 1982
    26 cites at Google Scholar
    -85% below average of year
    Last visited: Mar-2018
  9. 9
    Deepinder P. Sidhu, Morrie Gasser:
    A Multilevel Secure Local Area Network.
    IEEE Symposium on Security and Privacy, 1982
    18 cites at Google Scholar
    -90% below average of year
    Last visited: Dec-2017
  10. 10
    George I. Davida, Yi-Shiung Yeh:
    Cryptographic Relational Algebra.
    IEEE Symposium on Security and Privacy, 1982
    14 cites at Google Scholar
    -92% below average of year
    Last visited: Mar-2018

Top-cited papers from 1981 ⌄

  1. 1
    Allen Stoughton:
    Access Flow: A Protection Model which Integrates Access Control and Information Flow.
    IEEE Symposium on Security and Privacy, 1981
    39 cites at Google Scholar
    133% above average of year
    Last visited: Jan-2018
  2. 2
    Luke C. Dion:
    A Complete Protection Model.
    IEEE Symposium on Security and Privacy, 1981
    35 cites at Google Scholar
    109% above average of year
    Last visited: Feb-2018
  3. 3
    Lawrence J. Shirley, Roger R. Schell:
    Mechanism Sufficiency Validation by Assignment.
    IEEE Symposium on Security and Privacy, 1981
    34 cites at Google Scholar
    103% above average of year
    Last visited: Mar-2018
  4. 4
    G. R. Blakley, Laif Swanson:
    Security Proofs for Information Protection Systems.
    IEEE Symposium on Security and Privacy, 1981
    33 cites at Google Scholar
    97% above average of year
    Last visited: Feb-2018
  5. 5
    Jonathan K. Millen:
    Information Flow Analysis of Formal Specifications.
    IEEE Symposium on Security and Privacy, 1981
    31 cites at Google Scholar
    85% above average of year
    Last visited: Mar-2018
  6. 6
    Margaret S. Wu:
    Hierarchical Protection Systems.
    IEEE Symposium on Security and Privacy, 1981
    23 cites at Google Scholar
    37% above average of year
    Last visited: Apr-2018
  7. 7
    Stanley R. Ames Jr.:
    Security Kernels: A Solution or a Problem?
    IEEE Symposium on Security and Privacy, 1981
    20 cites at Google Scholar
    19% above average of year
    Last visited: Mar-2018
  8. 8
    Peter S. Tasker:
    Trusted Computer Systems.
    IEEE Symposium on Security and Privacy, 1981
    19 cites at Google Scholar
    13% above average of year
    Last visited: Mar-2018
  9. 9
    Daniel J. Solomon:
    Processing Multilevel Secure Objects.
    IEEE Symposium on Security and Privacy, 1981
    14 cites at Google Scholar
    -16% below average of year
    Last visited: Mar-2018
  10. 10
    David A. Bonyun:
    The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security.
    IEEE Symposium on Security and Privacy, 1981
    12 cites at Google Scholar
    -28% below average of year
    Last visited: Mar-2018