1
Dorothy E. Denning:
An Intrusion-Detection Model.
IEEE Symposium on Security and Privacy, 1986
1597% above average of year
Last visited: May-2020
2
Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, and Mark R. Heckman:
Views for Multilevel Database Security.
IEEE Symposium on Security and Privacy, 1986
-35% below average of year
Last visited: Mar-2021
3
J. Thomas Haigh and William D. Young:
Extending the Non-Interference Version of MLS for SAT.
IEEE Symposium on Security and Privacy, 1986
-42% below average of year
Last visited: May-2020
4
Andrew Birrell, Butler W. Lampson, Roger M. Needham, and Michael D. Schroeder:
A Global Authentication Service without Global Trust.
IEEE Symposium on Security and Privacy, 1986
-48% below average of year
Last visited: Feb-2021
5
John E. Dobson and Brian Randell:
Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
IEEE Symposium on Security and Privacy, 1986
-66% below average of year
Last visited: Mar-2021
6
J. Thomas Haigh, Richard A. Kemmerer, John McHugh, and William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Symposium on Security and Privacy, 1986
-71% below average of year
Last visited: Mar-2021
7
J.-M. Fray, Yves Deswarte, and David Powell:
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering.
IEEE Symposium on Security and Privacy, 1986
-73% below average of year
Last visited: Mar-2021
8
Richard Y. Kain and Carl E. Landwehr:
On Access Checking in Capability-Based Systems.
IEEE Symposium on Security and Privacy, 1986
-73% below average of year
Last visited: Feb-2021
9
Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, and N. Vasudevan:
On the Design and the Implementation of Secure Xenix Workstations.
IEEE Symposium on Security and Privacy, 1986
-82% below average of year
Last visited: Mar-2021
10
Dan M. Nessett:
Factors Affecting Distributed System Security.
IEEE Symposium on Security and Privacy, 1986
-84% below average of year
Last visited: Mar-2021
Top-cited papers from 1985 ⌄
-
1
Deborah Downs, Jerzy R. Rub, Kenneth C. Kung, and Carole S. Jordan:
Issues in Discretionary Access Control.
IEEE Symposium on Security and Privacy, 1985
348% above average of year
Last visited: Mar-2021
-
2
Dorothy E. Denning:
Commutative Filters for Reducing Inference Threats in Multilevel Database Systems.
IEEE Symposium on Security and Privacy, 1985
195% above average of year
Last visited: Mar-2021
-
3
Tatsuski Okamoto and Akira Shibaishi:
A Fast Signature Scheme Based on Quadratic Inequalities.
IEEE Symposium on Security and Privacy, 1985
82% above average of year
Last visited: Mar-2021
-
4
William Earl Boebert, R. Y. Kaln, William D. Young, and S. A. Hansohn:
Secure Ada Target: Issues, System Design, and Verification.
IEEE Symposium on Security and Privacy, 1985
79% above average of year
Last visited: Feb-2021
-
5
Gustavus J. Simmons:
How to (Selectively) Broadcast A Secret.
IEEE Symposium on Security and Privacy, 1985
69% above average of year
Last visited: Mar-2021
-
6
Stephen T. Walker:
Network Security Overview.
IEEE Symposium on Security and Privacy, 1985
47% above average of year
Last visited: Mar-2021
-
7
G. R. Blakley and Catherine A. Meadows:
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
IEEE Symposium on Security and Privacy, 1985
7% above average of year
Last visited: Mar-2021
-
8
Robert W. Baldwin and Wayne Gramlich:
Cryptographic Protocol for Trustable Match Making.
IEEE Symposium on Security and Privacy, 1985
7% above average of year
Last visited: Aug-2020
-
9
Richard D. Graubart and Kevin J. Duffy:
Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS.
IEEE Symposium on Security and Privacy, 1985
-19% below average of year
Last visited: Mar-2021
-
10
James P. Anderson:
A Unification of Computer and Network Security Concepts.
IEEE Symposium on Security and Privacy, 1985
-25% below average of year
Last visited: Feb-2021
Top-cited papers from 1984 ⌄
-
1
Joseph A. Goguen and José Meseguer:
Unwinding and Inference Control.
IEEE Symposium on Security and Privacy, 1984
1000% above average of year
Last visited: Mar-2021
-
2
Paul A. Karger and A. J. Herbert:
An Augmented Capability Architecture to Support Lattice Security and Traceability of Access.
IEEE Symposium on Security and Privacy, 1984
109% above average of year
Last visited: Apr-2020
-
3
Dorothy E. Denning:
Cryptographic Checksums for Multilevel Database Security.
IEEE Symposium on Security and Privacy, 1984
109% above average of year
Last visited: Mar-2021
-
4
Jonathan K. Millen:
The Interrogator: A Tool for Cryptographic Protocol Security.
IEEE Symposium on Security and Privacy, 1984
70% above average of year
Last visited: Mar-2021
-
5
Richard D. Graubart:
The Integrity-Lock Approach to Secure Database Management.
IEEE Symposium on Security and Privacy, 1984
6% above average of year
Last visited: Mar-2021
-
6
David Chaum:
A New Paradigm for Individuals in the Information Age.
IEEE Symposium on Security and Privacy, 1984
-18% below average of year
Last visited: Feb-2021
-
7
M. Schaefer and Roger R. Schell:
Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products.
IEEE Symposium on Security and Privacy, 1984
-43% below average of year
Last visited: Mar-2021
-
8
S. Kramer:
Linus IV : An Experiment in Computer Security.
IEEE Symposium on Security and Privacy, 1984
-51% below average of year
Last visited: Mar-2021
-
9
John D. McLean, Carl E. Landwehr, and Constance L. Heitmeyer:
A Formal Statement of the MMS Security Model.
IEEE Symposium on Security and Privacy, 1984
-63% below average of year
Last visited: Mar-2021
-
10
T. Taylor:
Comparison Paper between the Bell and LaPadula Model and the SRI Model.
IEEE Symposium on Security and Privacy, 1984
-71% below average of year
Last visited: Mar-2021
Top-cited papers from 1983 ⌄
-
1
Virgil D. Gligor:
A Note on the Denial-of-Service Problem.
IEEE Symposium on Security and Privacy, 1983
421% above average of year
Last visited: Mar-2021
-
2
John M. Rushby and Brian Randell:
A Distributed Secure System.
IEEE Symposium on Security and Privacy, 1983
368% above average of year
Last visited: Feb-2021
-
3
Robert R. Jueneman, Stephen M. Matyas, and Carl H. Meyer:
Message Authentication with Manipulation Detection Code.
IEEE Symposium on Security and Privacy, 1983
53% above average of year
Last visited: Mar-2021
-
4
Gustavus J. Simmons:
Verification of Treaty Compliance Revisited.
IEEE Symposium on Security and Privacy, 1983
13% above average of year
Last visited: Mar-2021
-
5
Bahaa W. Fam and Jonathan K. Millen:
The Channel Assignment Problem.
IEEE Symposium on Security and Privacy, 1983
-25% below average of year
Last visited: Dec-2019
-
6
Billy G. Claybrook:
Using Views in a Multilevel Secure Database Management System.
IEEE Symposium on Security and Privacy, 1983
-40% below average of year
Last visited: Mar-2021
-
7
Subhash C. Kak:
Joint Encryption and Error-Correction Coding.
IEEE Symposium on Security and Privacy, 1983
-42% below average of year
Last visited: Feb-2021
-
8
Stephen J. MacKinnon and Selim G. Akl:
New Key Generation Algorithms for Multilevel Security.
IEEE Symposium on Security and Privacy, 1983
-55% below average of year
Last visited: Mar-2021
-
9
Derek Barnes:
The Provision of Security for User Data on Packet Switched Networks.
IEEE Symposium on Security and Privacy, 1983
-80% below average of year
Last visited: Feb-2021
-
10
Roger R. Schell:
Evaluating Security Properties of Computer Systems.
IEEE Symposium on Security and Privacy, 1983
-80% below average of year
Last visited: Mar-2021
Top-cited papers from 1982 ⌄
-
1
Joseph A. Goguen and José Meseguer:
Security Policies and Security Models.
IEEE Symposium on Security and Privacy, 1982
1360% above average of year
Last visited: Mar-2021
-
2
Steven B. Lipner:
Non-Discretionery Controls for Commercial Applications.
IEEE Symposium on Security and Privacy, 1982
-10% below average of year
Last visited: Mar-2021
-
3
Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels.
IEEE Symposium on Security and Privacy, 1982
-45% below average of year
Last visited: Feb-2021
-
4
C. A. Asmuth and G. R. Blakley:
Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication.
IEEE Symposium on Security and Privacy, 1982
-79% below average of year
Last visited: Mar-2021
-
5
Richard D. Graubart and John P. L. Woodward:
A Preliminary Neval Surveillance OBMS Sacurity.
IEEE Symposium on Security and Privacy, 1982
-82% below average of year
Last visited: Mar-2021
-
6
Gustavus J. Simmons and Diane B. Holdridge:
Forward Search as a Cryptanalytic Tool Against a Public Key.
IEEE Symposium on Security and Privacy, 1982
-85% below average of year
Last visited: Feb-2021
-
7
Dorothy E. Denning, Jan Schlörer, and Elisabeth Wehrle:
Memoryless Inference Controls for Statistical Databases.
IEEE Symposium on Security and Privacy, 1982
-87% below average of year
Last visited: Feb-2021
-
8
Deepinder P. Sidhu and Morrie Gasser:
A Multilevel Secure Local Area Network.
IEEE Symposium on Security and Privacy, 1982
-89% below average of year
Last visited: Mar-2021
-
9
George I. Davida and Yi-Shiung Yeh:
Cryptographic Relational Algebra.
IEEE Symposium on Security and Privacy, 1982
-94% below average of year
Last visited: Mar-2021
-
10
Selim G. Akl:
Digital Signitures with Blindfolded Arbitrators Who Cannot Form Alliances.
IEEE Symposium on Security and Privacy, 1982
-96% below average of year
Last visited: Mar-2021
Top-cited papers from 1981 ⌄
-
1
Allen Stoughton:
Access Flow: A Protection Model which Integrates Access Control and Information Flow.
IEEE Symposium on Security and Privacy, 1981
145% above average of year
Last visited: Mar-2021
-
2
Lawrence J. Shirley and Roger R. Schell:
Mechanism Sufficiency Validation by Assignment.
IEEE Symposium on Security and Privacy, 1981
113% above average of year
Last visited: Mar-2021
-
3
G. R. Blakley and Laif Swanson:
Security Proofs for Information Protection Systems.
IEEE Symposium on Security and Privacy, 1981
81% above average of year
Last visited: Mar-2021
-
4
Luke C. Dion:
A Complete Protection Model.
IEEE Symposium on Security and Privacy, 1981
76% above average of year
Last visited: Mar-2021
-
5
Jonathan K. Millen:
Information Flow Analysis of Formal Specifications.
IEEE Symposium on Security and Privacy, 1981
76% above average of year
Last visited: Mar-2021
-
6
Daniel J. Solomon:
Processing Multilevel Secure Objects.
IEEE Symposium on Security and Privacy, 1981
70% above average of year
Last visited: Mar-2021
-
7
Stanley R. Ames Jr.:
Security Kernels: A Solution or a Problem?
IEEE Symposium on Security and Privacy, 1981
6% above average of year
Last visited: Mar-2021
-
8
David A. Bonyun:
The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security.
IEEE Symposium on Security and Privacy, 1981
-31% below average of year
Last visited: Mar-2021
-
9
Dorothy E. Denning:
Restriciting Queries that Might Lead to Compromise.
IEEE Symposium on Security and Privacy, 1981
-47% below average of year
Last visited: Feb-2021
-
10
Margaret S. Wu:
Hierarchical Protection Systems.
IEEE Symposium on Security and Privacy, 1981
-52% below average of year
Last visited: Feb-2021