Security Papers from the 1990s

This webpage is an attempt to assemble a ranking of top-cited security papers from the 1990s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top-cited papers from 1999 ⌄

  1. 1
    Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
    A Data Mining Framework for Building Intrusion Detection Models.
    IEEE Symposium on Security and Privacy, 1999
    1630 cites at Google Scholar
    878% above average of year
    Last visited: Nov-2017
  2. 2
    Ari Juels, Martin Wattenberg:
    A Fuzzy Commitment Scheme.
    ACM Conference on Computer and Communications Security (CCS), 1999
    1475 cites at Google Scholar
    785% above average of year
    Last visited: Nov-2017
  3. 3
    Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
    Detecting Intrusions using System Calls: Alternative Data Models.
    IEEE Symposium on Security and Privacy, 1999
    1419 cites at Google Scholar
    752% above average of year
    Last visited: Oct-2017
  4. 4
    Charles Lynn:
    Secure Border Gateway Protocol (S-BGP).
    Network and Distributed System Security Symposium (NDSS), 1999
    945 cites at Google Scholar
    467% above average of year
    Last visited: Dec-2017
  5. 5
    Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
    The Design and Analysis of Graphical Passwords.
    USENIX Security Symposium, 1999
    875 cites at Google Scholar
    425% above average of year
    Last visited: Sep-2017
  6. 6
    Ari Juels, John G. Brainard:
    Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
    Network and Distributed System Security Symposium (NDSS), 1999
    758 cites at Google Scholar
    355% above average of year
    Last visited: Dec-2017
  7. 7
    Fabian Monrose, Michael K. Reiter, Susanne Wetzel:
    Password Hardening Based on Keystroke Dynamics.
    ACM Conference on Computer and Communications Security (CCS), 1999
    588 cites at Google Scholar
    253% above average of year
    Last visited: Nov-2017
  8. 8
    Anup K. Ghosh, Aaron Schwartzbard:
    A Study in Using Neural Networks for Anomaly and Misuse Detection.
    USENIX Security Symposium, 1999
    546 cites at Google Scholar
    228% above average of year
    Last visited: Oct-2017
  9. 9
    Ronald Cramer, Victor Shoup:
    Signature Schemes Based on the Strong RSA Assumption.
    ACM Conference on Computer and Communications Security (CCS), 1999
    546 cites at Google Scholar
    228% above average of year
    Last visited: Dec-2017
  10. 10
    Howard E. Shrobe:
    Software Technology of the Future.
    IEEE Symposium on Security and Privacy, 1999
    531 cites at Google Scholar
    219% above average of year
    Last visited: Sep-2016

Top-cited papers from 1998 ⌄

  1. 1
    Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
    A Security Architecture for Computational Grids.
    ACM Conference on Computer and Communications Security (CCS), 1998
    1871 cites at Google Scholar
    1072% above average of year
    Last visited: Dec-2017
  2. 2
    Wenke Lee, Salvatore J. Stolfo:
    Data Mining Approaches for Intrusion Detection.
    USENIX Security Symposium, 1998
    1689 cites at Google Scholar
    958% above average of year
    Last visited: Oct-2017
  3. 3
    Crispan Cowan:
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
    USENIX Security Symposium, 1998
    1684 cites at Google Scholar
    955% above average of year
    Last visited: Dec-2017
  4. 4
    J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni:
    An Architecture for Intrusion Detection Using Autonomous Agents.
    Annual Computer Security Applications Conference (ACSAC), 1998
    774 cites at Google Scholar
    385% above average of year
    Last visited: Dec-2017
  5. 5
    F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman:
    Strand Spaces: Why is a Security Protocol Correct?
    IEEE Symposium on Security and Privacy, 1998
    700 cites at Google Scholar
    339% above average of year
    Last visited: Oct-2017
  6. 6
    Terran Lane, Carla E. Brodley:
    Temporal Sequence Learning and Data Reduction for Anomaly Detection.
    ACM Conference on Computer and Communications Security (CCS), 1998
    672 cites at Google Scholar
    321% above average of year
    Last visited: Nov-2017
  7. 7
    Thomas D. Wu:
    The Secure Remote Password Protocol.
    Network and Distributed System Security Symposium (NDSS), 1998
    627 cites at Google Scholar
    293% above average of year
    Last visited: Dec-2017
  8. 8
    Kobbi Nissim, Moni Naor:
    Certificate Revocation and Certificate Update.
    USENIX Security Symposium, 1998
    626 cites at Google Scholar
    292% above average of year
    Last visited: Nov-2017
  9. 9
    George I. Davida, Yair Frankel, Brian J. Matt:
    On Enabling Secure Applications Through Off-Line Biometric Identification.
    IEEE Symposium on Security and Privacy, 1998
    548 cites at Google Scholar
    243% above average of year
    Last visited: Dec-2017
  10. 10
    Shai Halevi, Hugo Krawczyk:
    Public-Key Cryptography and Password Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1998
    501 cites at Google Scholar
    214% above average of year
    Last visited: Sep-2017

Top-cited papers from 1997 ⌄

  1. 1
    Martín Abadi, Andrew D. Gordon:
    A Calculus for Cryptographic Protocols: The Spi Calculus.
    ACM Conference on Computer and Communications Security (CCS), 1997
    1895 cites at Google Scholar
    1500% above average of year
    Last visited: Nov-2017
  2. 2
    William A. Arbaugh, David J. Farber, Jonathan M. Smith:
    A Secure and Reliable Bootstrap Architecture.
    IEEE Symposium on Security and Privacy, 1997
    749 cites at Google Scholar
    533% above average of year
    Last visited: Dec-2017
  3. 3
    John C. Mitchell, Mark Mitchell, Ulrich Stern:
    Automated analysis of cryptographic protocols using Mur-phi.
    IEEE Symposium on Security and Privacy, 1997
    700 cites at Google Scholar
    491% above average of year
    Last visited: Dec-2017
  4. 4
    Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni:
    Analysis of a Denial of Service Attack on TCP.
    IEEE Symposium on Security and Privacy, 1997
    616 cites at Google Scholar
    420% above average of year
    Last visited: Nov-2017
  5. 5
    Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian:
    A Logical Language for Expressing Authorizations.
    IEEE Symposium on Security and Privacy, 1997
    612 cites at Google Scholar
    417% above average of year
    Last visited: Oct-2017
  6. 6
    N. Asokan, Matthias Schunter, Michael Waidner:
    Optimistic Protocols for Fair Exchange.
    ACM Conference on Computer and Communications Security (CCS), 1997
    590 cites at Google Scholar
    398% above average of year
    Last visited: Nov-2017
  7. 7
    Calvin Ko, Manfred Ruschitzka, Karl N. Levitt:
    Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
    IEEE Symposium on Security and Privacy, 1997
    424 cites at Google Scholar
    258% above average of year
    Last visited: Oct-2017
  8. 8
    Ulf Lindqvist, Erland Jonsson:
    How to Systematically Classify Computer Security Intrusions.
    IEEE Symposium on Security and Privacy, 1997
    372 cites at Google Scholar
    214% above average of year
    Last visited: Dec-2017
  9. 9
    Matthew K. Franklin, Michael K. Reiter:
    Fair Exchange with a Semi-Trusted Third Party (extended abstract).
    ACM Conference on Computer and Communications Security (CCS), 1997
    366 cites at Google Scholar
    209% above average of year
    Last visited: Dec-2017
  10. 10
    Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
    Proactive Public Key and Signature Systems.
    ACM Conference on Computer and Communications Security (CCS), 1997
    341 cites at Google Scholar
    188% above average of year
    Last visited: Nov-2017

Top-cited papers from 1996 ⌄

  1. 1
    Matt Blaze, Joan Feigenbaum, Jack Lacy:
    Decentralized Trust Management.
    IEEE Symposium on Security and Privacy, 1996
    2924 cites at Google Scholar
    1926% above average of year
    Last visited: Nov-2017
  2. 2
    Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
    The Omega Key Management Service.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1334 cites at Google Scholar
    824% above average of year
    Last visited: Sep-2016
  3. 3
    Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
    Proxy Signatures for Delegating Signing Operation.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1107 cites at Google Scholar
    667% above average of year
    Last visited: Dec-2017
  4. 4
    Michael Steiner, Gene Tsudik, Michael Waidner:
    Diffie-Hellman Key Distribution Extended to Group Communication.
    ACM Conference on Computer and Communications Security (CCS), 1996
    952 cites at Google Scholar
    560% above average of year
    Last visited: Nov-2017
  5. 5
    Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer:
    A Secure Environment for Untrusted Helper Applications.
    USENIX Security Symposium, 1996
    844 cites at Google Scholar
    485% above average of year
    Last visited: Dec-2017
  6. 6
    Patrik D'haeseleer, Stephanie Forrest, Paul Helman:
    An Immunological Approach to Change Detection: Algorithms, Analysis and Implications.
    IEEE Symposium on Security and Privacy, 1996
    607 cites at Google Scholar
    321% above average of year
    Last visited: Dec-2017
  7. 7
    Ueli M. Maurer:
    Modelling a Public-Key Infrastructure.
    European Symposium on Research in Computer Security (ESORICS), 1996
    446 cites at Google Scholar
    209% above average of year
    Last visited: Nov-2017
  8. 8
    Ross J. Anderson:
    A Security Policy Model for Clinical Information Systems.
    IEEE Symposium on Security and Privacy, 1996
    425 cites at Google Scholar
    194% above average of year
    Last visited: Nov-2017
  9. 9
    Drew Dean, Edward W. Felten, Dan S. Wallach:
    Java Security: From HotJava to Netscape and Beyond.
    IEEE Symposium on Security and Privacy, 1996
    415 cites at Google Scholar
    188% above average of year
    Last visited: Sep-2017
  10. 10
    William M. Farmer, Joshua D. Guttman, Vipin Swarup:
    Security for Mobile Agents: Authentication and State Appraisal.
    European Symposium on Research in Computer Security (ESORICS), 1996
    366 cites at Google Scholar
    154% above average of year
    Last visited: Nov-2017

Top-cited papers from 1995 ⌄

  1. 1
    Matthew K. Franklin, Michael K. Reiter:
    The design and implementation of a secure auction service.
    IEEE Symposium on Security and Privacy, 1995
    446 cites at Google Scholar
    527% above average of year
    Last visited: Dec-2017
  2. 2
    Stuart Staniford-Chen, Todd L. Heberlein:
    Holding intruders accountable on the Internet.
    IEEE Symposium on Security and Privacy, 1995
    385 cites at Google Scholar
    441% above average of year
    Last visited: Oct-2017
  3. 3
    Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat:
    Practical Domain and Type Enforcement for UNIX.
    IEEE Symposium on Security and Privacy, 1995
    278 cites at Google Scholar
    291% above average of year
    Last visited: Nov-2017
  4. 4
    Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat:
    A Domain and Type Enforcement UNIX Prototype.
    USENIX Security Symposium, 1995
    239 cites at Google Scholar
    236% above average of year
    Last visited: Dec-2017
  5. 5
    A. W. Roscoe:
    CSP and determinism in security modelling.
    IEEE Symposium on Security and Privacy, 1995
    236 cites at Google Scholar
    232% above average of year
    Last visited: Oct-2017
  6. 6
    Steven M. Bellovin:
    Using the Domain Name System for System Break-ins.
    USENIX Security Symposium, 1995
    188 cites at Google Scholar
    164% above average of year
    Last visited: Nov-2017
  7. 7
    Tony Ballardie, Jon Crowcroft:
    Multicast-specific security threats and counter-measures.
    Network and Distributed System Security Symposium (NDSS), 1995
    187 cites at Google Scholar
    163% above average of year
    Last visited: Dec-2017
  8. 8
    Ravi Ganesan:
    Yaksha: augmenting Kerberos with public key cryptography.
    Network and Distributed System Security Symposium (NDSS), 1995
    118 cites at Google Scholar
    66% above average of year
    Last visited: Oct-2017
  9. 9
    David A. Cooper, Kenneth P. Birman:
    Preserving privacy in a network of mobile computers.
    IEEE Symposium on Security and Privacy, 1995
    117 cites at Google Scholar
    64% above average of year
    Last visited: Nov-2017
  10. 10
    Aviel D. Rubin:
    Independent One-Time Passwords.
    USENIX Security Symposium, 1995
    113 cites at Google Scholar
    59% above average of year
    Last visited: Dec-2017

Top-cited papers from 1994 ⌄

  1. 1
    Thomas Beth, Malte Borcherding, Birgit Klein:
    Valuation of Trust in Open Networks.
    European Symposium on Research in Computer Security (ESORICS), 1994
    1132 cites at Google Scholar
    1486% above average of year
    Last visited: Sep-2017
  2. 2
    Martín Abadi, Roger M. Needham:
    Prudent engineering practice for cryptographic protocols.
    IEEE Symposium on Security and Privacy, 1994
    895 cites at Google Scholar
    1154% above average of year
    Last visited: Nov-2017
  3. 3
    Gene H. Kim, Eugene H. Spafford:
    The Design and Implementation of Tripwire: A File System Integrity Checker.
    ACM Conference on Computer and Communications Security (CCS), 1994
    692 cites at Google Scholar
    869% above average of year
    Last visited: Oct-2017
  4. 4
    Paul F. Syverson, Paul C. van Oorschot:
    On unifying some cryptographic protocol logics.
    IEEE Symposium on Security and Privacy, 1994
    445 cites at Google Scholar
    523% above average of year
    Last visited: Dec-2017
  5. 5
    John McLean:
    A general theory of composition for trace sets closed under selective interleaving functions.
    IEEE Symposium on Security and Privacy, 1994
    357 cites at Google Scholar
    400% above average of year
    Last visited: Nov-2017
  6. 6
    Calvin Ko, George Fink, Karl N. Levitt:
    Automated detection of vulnerabilities in privileged programs by execution monitoring.
    Annual Computer Security Applications Conference (ACSAC), 1994
    322 cites at Google Scholar
    351% above average of year
    Last visited: Oct-2017
  7. 7
    Michael K. Reiter:
    Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart.
    ACM Conference on Computer and Communications Security (CCS), 1994
    319 cites at Google Scholar
    347% above average of year
    Last visited: Sep-2017
  8. 8
    Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner:
    The ESPRIT Project CAFE - High Security Digital Payment Systems.
    European Symposium on Research in Computer Security (ESORICS), 1994
    206 cites at Google Scholar
    189% above average of year
    Last visited: Nov-2017
  9. 9
    Michael K. Reiter:
    A secure group membership protocol.
    IEEE Symposium on Security and Privacy, 1994
    167 cites at Google Scholar
    134% above average of year
    Last visited: Nov-2017
  10. 10
    Steven H. Low, Sanjoy Paul, Nicholas F. Maxemchuk:
    Anonymous Credit Cards.
    ACM Conference on Computer and Communications Security (CCS), 1994
    159 cites at Google Scholar
    123% above average of year
    Last visited: Nov-2017

Top-cited papers from 1993 ⌄

  1. 1
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4621 cites at Google Scholar
    2766% above average of year
    Last visited: Dec-2017
  2. 2
    Roger M. Needham:
    Denial of Service.
    ACM Conference on Computer and Communications Security (CCS), 1993
    1925 cites at Google Scholar
    1094% above average of year
    Last visited: Nov-2017
  3. 3
    Ross J. Anderson:
    Why Cryptosystems Fail.
    ACM Conference on Computer and Communications Security (CCS), 1993
    816 cites at Google Scholar
    406% above average of year
    Last visited: Dec-2017
  4. 4
    Matt Blaze:
    A Cryptographic File System for UNIX.
    ACM Conference on Computer and Communications Security (CCS), 1993
    651 cites at Google Scholar
    304% above average of year
    Last visited: Dec-2017
  5. 5
    Steven M. Bellovin, Michael Merritt:
    Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
    ACM Conference on Computer and Communications Security (CCS), 1993
    547 cites at Google Scholar
    239% above average of year
    Last visited: Nov-2017
  6. 6
    Jeffrey O. Kephart, Steve R. White:
    Measuring and modeling computer virus prevalence.
    IEEE Symposium on Security and Privacy, 1993
    428 cites at Google Scholar
    165% above average of year
    Last visited: Oct-2017
  7. 7
    Koral Ilgun:
    USTAT: a real-time intrusion detection system for UNIX.
    IEEE Symposium on Security and Privacy, 1993
    417 cites at Google Scholar
    159% above average of year
    Last visited: Dec-2017
  8. 8
    Gennady Medvinsky, B. Clifford Neuman:
    NetCash: A Design for Practical Electronic Currency on the Internet.
    ACM Conference on Computer and Communications Security (CCS), 1993
    413 cites at Google Scholar
    156% above average of year
    Last visited: Nov-2017
  9. 9
    Thomas Y. C. Woo, Simon S. Lam:
    A semantic model for authentication protocols.
    IEEE Symposium on Security and Privacy, 1993
    377 cites at Google Scholar
    134% above average of year
    Last visited: Oct-2017
  10. 10
    Raphael Yahalom, Birgit Klein, Thomas Beth:
    Trust relationships in secure systems-a distributed authentication perspective.
    IEEE Symposium on Security and Privacy, 1993
    356 cites at Google Scholar
    121% above average of year
    Last visited: Nov-2017

Top-cited papers from 1992 ⌄

  1. 1
    Steven M. Bellovin, Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy, 1992
    1717 cites at Google Scholar
    2082% above average of year
    Last visited: Dec-2017
  2. 2
    Hervé Debar, Monique Becker, Didier Siboni:
    A neural network component for an intrusion detection system.
    IEEE Symposium on Security and Privacy, 1992
    667 cites at Google Scholar
    748% above average of year
    Last visited: Nov-2017
  3. 3
    Ravi S. Sandhu:
    The typed access matrix model.
    IEEE Symposium on Security and Privacy, 1992
    372 cites at Google Scholar
    373% above average of year
    Last visited: Dec-2017
  4. 4
    Charles W. Kurak Jr., John McHugh:
    A cautionary note on image downgrading.
    Annual Computer Security Applications Conference (ACSAC), 1992
    219 cites at Google Scholar
    178% above average of year
    Last visited: Nov-2017
  5. 5
    Phillip A. Porras, Richard A. Kemmerer:
    Penetration state transition analysis: A rule-based intrusion detection approach.
    Annual Computer Security Applications Conference (ACSAC), 1992
    184 cites at Google Scholar
    134% above average of year
    Last visited: Aug-2017
  6. 6
    Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti:
    KryptoKnight Authentication and Key Distribution System.
    European Symposium on Research in Computer Security (ESORICS), 1992
    161 cites at Google Scholar
    105% above average of year
    Last visited: Nov-2017
  7. 7
    Stuart G. Stubblebine, Virgil D. Gligor:
    On message integrity in cryptographic protocols.
    IEEE Symposium on Security and Privacy, 1992
    118 cites at Google Scholar
    50% above average of year
    Last visited: Dec-2017
  8. 8
    Wei-Ming Hu:
    Lattice scheduling and covert channels.
    IEEE Symposium on Security and Privacy, 1992
    112 cites at Google Scholar
    42% above average of year
    Last visited: Dec-2017
  9. 9
    Thomas Y. C. Woo, Simon S. Lam:
    Authorization in distributed systems: a formal approach.
    IEEE Symposium on Security and Privacy, 1992
    110 cites at Google Scholar
    40% above average of year
    Last visited: Dec-2017
  10. 10
    Jonathan K. Millen:
    A resource allocation model for denial of service.
    IEEE Symposium on Security and Privacy, 1992
    109 cites at Google Scholar
    39% above average of year
    Last visited: Nov-2017

Top-cited papers from 1991 ⌄

  1. 1
    Jeffrey O. Kephart, Steve R. White:
    Directed-Graph Epidemiological Models of Computer Viruses.
    IEEE Symposium on Security and Privacy, 1991
    893 cites at Google Scholar
    956% above average of year
    Last visited: Dec-2017
  2. 2
    H. S. Javitz, A. Valdes:
    The SRI IDES Statistical Anomaly Detector.
    IEEE Symposium on Security and Privacy, 1991
    405 cites at Google Scholar
    379% above average of year
    Last visited: Nov-2017
  3. 3
    Yves Deswarte, Laurent Blain, Jean-Charles Fabre:
    Intrusion Tolerance in Distributed Computing Systems.
    IEEE Symposium on Security and Privacy, 1991
    343 cites at Google Scholar
    306% above average of year
    Last visited: Sep-2017
  4. 4
    Wei-Ming Hu:
    Reducing Timing Channels with Fuzzy Time.
    IEEE Symposium on Security and Privacy, 1991
    271 cites at Google Scholar
    220% above average of year
    Last visited: Dec-2017
  5. 5
    James W. Gray III:
    Toward a Mathematical Foundation for Information Flow Security.
    IEEE Symposium on Security and Privacy, 1991
    243 cites at Google Scholar
    187% above average of year
    Last visited: Oct-2017
  6. 6
    John C. Wray:
    An Analysis of Covert Timing Channels.
    IEEE Symposium on Security and Privacy, 1991
    200 cites at Google Scholar
    137% above average of year
    Last visited: Dec-2017
  7. 7
    Joseph J. Tardo, Kannan Alagappan:
    SPX: Global Authentication Using Public Key Certificates.
    IEEE Symposium on Security and Privacy, 1991
    188 cites at Google Scholar
    122% above average of year
    Last visited: Dec-2017
  8. 8
    John P. McDermott, Sushil Jajodia, Ravi S. Sandhu:
    A single-level scheduler for the replicated architecture for multilevel-secure databases.
    Annual Computer Security Applications Conference (ACSAC), 1991
    184 cites at Google Scholar
    118% above average of year
    Last visited: Aug-2017
  9. 9
    Vijay Varadharajan, Phillip Allen, Stewart Black:
    An Analysis of the Proxy Problem in Distributed Systems.
    IEEE Symposium on Security and Privacy, 1991
    164 cites at Google Scholar
    94% above average of year
    Last visited: Dec-2017
  10. 10
    Daniel F. Sterne:
    On the Buzzword "Security Policy".
    IEEE Symposium on Security and Privacy, 1991
    126 cites at Google Scholar
    49% above average of year
    Last visited: Nov-2017

Top-cited papers from 1990 ⌄

  1. 1
    Li Gong, Roger M. Needham, Raphael Yahalom:
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy, 1990
    833 cites at Google Scholar
    1110% above average of year
    Last visited: Nov-2017
  2. 2
    L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber:
    A Network Security Monitor.
    IEEE Symposium on Security and Privacy, 1990
    545 cites at Google Scholar
    692% above average of year
    Last visited: Dec-2017
  3. 3
    John McLean:
    Security Models and Information Flow.
    IEEE Symposium on Security and Privacy, 1990
    531 cites at Google Scholar
    671% above average of year
    Last visited: Dec-2017
  4. 4
    J. Todd Wittbold, Dale M. Johnson:
    Information Flow in Nondeterministic Systems.
    IEEE Symposium on Security and Privacy, 1990
    286 cites at Google Scholar
    315% above average of year
    Last visited: Nov-2017
  5. 5
    Henry S. Teng, Kaihu Chen, Stephen C. Y. Lu:
    Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns.
    IEEE Symposium on Security and Privacy, 1990
    275 cites at Google Scholar
    300% above average of year
    Last visited: Jul-2017
  6. 6
    Morrie Gasser, E. McDermott:
    An Architecture for Practical Delegation in a Distributed System.
    IEEE Symposium on Security and Privacy, 1990
    259 cites at Google Scholar
    276% above average of year
    Last visited: Dec-2017
  7. 7
    Thomas F. Keefe, Wei-Tek Tsai:
    Multiversion Concurrency Control for Multilevel Secure Database Systems.
    IEEE Symposium on Security and Privacy, 1990
    258 cites at Google Scholar
    275% above average of year
    Last visited: Nov-2017
  8. 8
    William T. Maimone, Ira B. Greenberg:
    Single-level multiversion schedulers for multilevel secure database systems.
    Annual Computer Security Applications Conference (ACSAC), 1990
    223 cites at Google Scholar
    224% above average of year
    Last visited: Sep-2017
  9. 9
    Catherine D. McCollum, J. R. Messing, LouAnna Notargiacomo:
    Beyond the Pale of MAC and DAC-Defining New Forms of Access Control.
    IEEE Symposium on Security and Privacy, 1990
    198 cites at Google Scholar
    188% above average of year
    Last visited: Nov-2017
  10. 10
    Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn:
    A VMM Security Kernel for the VAX Architecture.
    IEEE Symposium on Security and Privacy, 1990
    190 cites at Google Scholar
    176% above average of year
    Last visited: Dec-2017