1
Dorothy E. Denning:
An Intrusion-Detection Model.
IEEE Symposium on Security and Privacy, 1986
1587% above average of year
Last visited: May-2020
2
Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, and Mark R. Heckman:
Views for Multilevel Database Security.
IEEE Symposium on Security and Privacy, 1986
-34% below average of year
Last visited: Dec-2020
3
J. Thomas Haigh and William D. Young:
Extending the Non-Interference Version of MLS for SAT.
IEEE Symposium on Security and Privacy, 1986
-43% below average of year
Last visited: May-2020
4
Andrew Birrell, Butler W. Lampson, Roger M. Needham, and Michael D. Schroeder:
A Global Authentication Service without Global Trust.
IEEE Symposium on Security and Privacy, 1986
-46% below average of year
Last visited: Dec-2020
5
John E. Dobson and Brian Randell:
Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
IEEE Symposium on Security and Privacy, 1986
-65% below average of year
Last visited: Dec-2020
6
J. Thomas Haigh, Richard A. Kemmerer, John McHugh, and William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Symposium on Security and Privacy, 1986
-72% below average of year
Last visited: Dec-2020
7
J.-M. Fray, Yves Deswarte, and David Powell:
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering.
IEEE Symposium on Security and Privacy, 1986
-73% below average of year
Last visited: Dec-2020
8
Richard Y. Kain and Carl E. Landwehr:
On Access Checking in Capability-Based Systems.
IEEE Symposium on Security and Privacy, 1986
-73% below average of year
Last visited: Dec-2020
9
Dan M. Nessett:
Factors Affecting Distributed System Security.
IEEE Symposium on Security and Privacy, 1986
-76% below average of year
Last visited: Dec-2020
10
Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, and N. Vasudevan:
On the Design and the Implementation of Secure Xenix Workstations.
IEEE Symposium on Security and Privacy, 1986
-83% below average of year
Last visited: Dec-2020
Top-cited papers from 1985 ⌄
-
1
Deborah Downs, Jerzy R. Rub, Kenneth C. Kung, and Carole S. Jordan:
Issues in Discretionary Access Control.
IEEE Symposium on Security and Privacy, 1985
337% above average of year
Last visited: Dec-2020
-
2
Dorothy E. Denning:
Commutative Filters for Reducing Inference Threats in Multilevel Database Systems.
IEEE Symposium on Security and Privacy, 1985
197% above average of year
Last visited: Dec-2020
-
3
William Earl Boebert, R. Y. Kaln, William D. Young, and S. A. Hansohn:
Secure Ada Target: Issues, System Design, and Verification.
IEEE Symposium on Security and Privacy, 1985
84% above average of year
Last visited: Dec-2020
-
4
Tatsuski Okamoto and Akira Shibaishi:
A Fast Signature Scheme Based on Quadratic Inequalities.
IEEE Symposium on Security and Privacy, 1985
78% above average of year
Last visited: Jan-2021
-
5
Gustavus J. Simmons:
How to (Selectively) Broadcast A Secret.
IEEE Symposium on Security and Privacy, 1985
75% above average of year
Last visited: Jan-2021
-
6
Stephen T. Walker:
Network Security Overview.
IEEE Symposium on Security and Privacy, 1985
50% above average of year
Last visited: Dec-2020
-
7
G. R. Blakley and Catherine A. Meadows:
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
IEEE Symposium on Security and Privacy, 1985
12% above average of year
Last visited: Dec-2020
-
8
Robert W. Baldwin and Wayne Gramlich:
Cryptographic Protocol for Trustable Match Making.
IEEE Symposium on Security and Privacy, 1985
6% above average of year
Last visited: Aug-2020
-
9
Raymond Wong, Thomas A. Berson, and Richard J. Feiertag:
Polonium: An Identity Authentication System.
IEEE Symposium on Security and Privacy, 1985
-22% below average of year
Last visited: Dec-2020
-
10
Richard D. Graubart and Kevin J. Duffy:
Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS.
IEEE Symposium on Security and Privacy, 1985
-22% below average of year
Last visited: Dec-2020
Top-cited papers from 1984 ⌄
-
1
Joseph A. Goguen and José Meseguer:
Unwinding and Inference Control.
IEEE Symposium on Security and Privacy, 1984
982% above average of year
Last visited: Jan-2021
-
2
Paul A. Karger and A. J. Herbert:
An Augmented Capability Architecture to Support Lattice Security and Traceability of Access.
IEEE Symposium on Security and Privacy, 1984
109% above average of year
Last visited: Apr-2020
-
3
Dorothy E. Denning:
Cryptographic Checksums for Multilevel Database Security.
IEEE Symposium on Security and Privacy, 1984
105% above average of year
Last visited: Dec-2020
-
4
Jonathan K. Millen:
The Interrogator: A Tool for Cryptographic Protocol Security.
IEEE Symposium on Security and Privacy, 1984
66% above average of year
Last visited: Dec-2020
-
5
Richard D. Graubart:
The Integrity-Lock Approach to Secure Database Management.
IEEE Symposium on Security and Privacy, 1984
4% above average of year
Last visited: Jan-2021
-
6
David Chaum:
A New Paradigm for Individuals in the Information Age.
IEEE Symposium on Security and Privacy, 1984
-12% below average of year
Last visited: Dec-2020
-
7
M. Schaefer and Roger R. Schell:
Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products.
IEEE Symposium on Security and Privacy, 1984
-39% below average of year
Last visited: Dec-2020
-
8
S. Kramer:
Linus IV : An Experiment in Computer Security.
IEEE Symposium on Security and Privacy, 1984
-49% below average of year
Last visited: Dec-2020
-
9
John D. McLean, Carl E. Landwehr, and Constance L. Heitmeyer:
A Formal Statement of the MMS Security Model.
IEEE Symposium on Security and Privacy, 1984
-65% below average of year
Last visited: Jan-2021
-
10
T. Taylor:
Comparison Paper between the Bell and LaPadula Model and the SRI Model.
IEEE Symposium on Security and Privacy, 1984
-69% below average of year
Last visited: Dec-2020
Top-cited papers from 1983 ⌄
-
1
Virgil D. Gligor:
A Note on the Denial-of-Service Problem.
IEEE Symposium on Security and Privacy, 1983
405% above average of year
Last visited: Dec-2020
-
2
John M. Rushby and Brian Randell:
A Distributed Secure System.
IEEE Symposium on Security and Privacy, 1983
365% above average of year
Last visited: Dec-2020
-
3
Robert R. Jueneman, Stephen M. Matyas, and Carl H. Meyer:
Message Authentication with Manipulation Detection Code.
IEEE Symposium on Security and Privacy, 1983
59% above average of year
Last visited: Jan-2021
-
4
Gustavus J. Simmons:
Verification of Treaty Compliance Revisited.
IEEE Symposium on Security and Privacy, 1983
24% above average of year
Last visited: Jan-2021
-
5
Bahaa W. Fam and Jonathan K. Millen:
The Channel Assignment Problem.
IEEE Symposium on Security and Privacy, 1983
-25% below average of year
Last visited: Dec-2019
-
6
Billy G. Claybrook:
Using Views in a Multilevel Secure Database Management System.
IEEE Symposium on Security and Privacy, 1983
-43% below average of year
Last visited: Jan-2021
-
7
Subhash C. Kak:
Joint Encryption and Error-Correction Coding.
IEEE Symposium on Security and Privacy, 1983
-43% below average of year
Last visited: Dec-2020
-
8
Stephen J. MacKinnon and Selim G. Akl:
New Key Generation Algorithms for Multilevel Security.
IEEE Symposium on Security and Privacy, 1983
-55% below average of year
Last visited: Dec-2020
-
9
Roger R. Schell:
Evaluating Security Properties of Computer Systems.
IEEE Symposium on Security and Privacy, 1983
-78% below average of year
Last visited: Dec-2020
-
10
Derek Barnes:
The Provision of Security for User Data on Packet Switched Networks.
IEEE Symposium on Security and Privacy, 1983
-83% below average of year
Last visited: Dec-2020
Top-cited papers from 1982 ⌄
-
1
Joseph A. Goguen and José Meseguer:
Security Policies and Security Models.
IEEE Symposium on Security and Privacy, 1982
1353% above average of year
Last visited: Dec-2020
-
2
Steven B. Lipner:
Non-Discretionery Controls for Commercial Applications.
IEEE Symposium on Security and Privacy, 1982
-8% below average of year
Last visited: Dec-2020
-
3
Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels.
IEEE Symposium on Security and Privacy, 1982
-46% below average of year
Last visited: Dec-2020
-
4
C. A. Asmuth and G. R. Blakley:
Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication.
IEEE Symposium on Security and Privacy, 1982
-79% below average of year
Last visited: Dec-2020
-
5
Richard D. Graubart and John P. L. Woodward:
A Preliminary Neval Surveillance OBMS Sacurity.
IEEE Symposium on Security and Privacy, 1982
-81% below average of year
Last visited: Jan-2021
-
6
Dorothy E. Denning, Jan Schlörer, and Elisabeth Wehrle:
Memoryless Inference Controls for Statistical Databases.
IEEE Symposium on Security and Privacy, 1982
-83% below average of year
Last visited: Dec-2020
-
7
Gustavus J. Simmons and Diane B. Holdridge:
Forward Search as a Cryptanalytic Tool Against a Public Key.
IEEE Symposium on Security and Privacy, 1982
-86% below average of year
Last visited: Dec-2020
-
8
Deepinder P. Sidhu and Morrie Gasser:
A Multilevel Secure Local Area Network.
IEEE Symposium on Security and Privacy, 1982
-90% below average of year
Last visited: Jan-2021
-
9
George I. Davida and Yi-Shiung Yeh:
Cryptographic Relational Algebra.
IEEE Symposium on Security and Privacy, 1982
-93% below average of year
Last visited: Dec-2020
-
10
Selim G. Akl:
Digital Signitures with Blindfolded Arbitrators Who Cannot Form Alliances.
IEEE Symposium on Security and Privacy, 1982
-96% below average of year
Last visited: Jan-2021
Top-cited papers from 1981 ⌄
-
1
Allen Stoughton:
Access Flow: A Protection Model which Integrates Access Control and Information Flow.
IEEE Symposium on Security and Privacy, 1981
136% above average of year
Last visited: Jan-2021
-
2
Lawrence J. Shirley and Roger R. Schell:
Mechanism Sufficiency Validation by Assignment.
IEEE Symposium on Security and Privacy, 1981
104% above average of year
Last visited: Dec-2020
-
3
Luke C. Dion:
A Complete Protection Model.
IEEE Symposium on Security and Privacy, 1981
82% above average of year
Last visited: Jan-2021
-
4
G. R. Blakley and Laif Swanson:
Security Proofs for Information Protection Systems.
IEEE Symposium on Security and Privacy, 1981
77% above average of year
Last visited: Dec-2020
-
5
Jonathan K. Millen:
Information Flow Analysis of Formal Specifications.
IEEE Symposium on Security and Privacy, 1981
71% above average of year
Last visited: Nov-2020
-
6
Daniel J. Solomon:
Processing Multilevel Secure Objects.
IEEE Symposium on Security and Privacy, 1981
71% above average of year
Last visited: Dec-2020
-
7
Stanley R. Ames Jr.:
Security Kernels: A Solution or a Problem?
IEEE Symposium on Security and Privacy, 1981
2% above average of year
Last visited: Dec-2020
-
8
David A. Bonyun:
The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security.
IEEE Symposium on Security and Privacy, 1981
-20% below average of year
Last visited: Jan-2021
-
9
Dorothy E. Denning:
Restriciting Queries that Might Lead to Compromise.
IEEE Symposium on Security and Privacy, 1981
-41% below average of year
Last visited: Dec-2020
-
10
Margaret S. Wu:
Hierarchical Protection Systems.
IEEE Symposium on Security and Privacy, 1981
-52% below average of year
Last visited: Dec-2020