6
L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, and David Wolber:
A Network Security Monitor.
IEEE Symposium on Security and Privacy, 1990
325% above average of year
Last visited: Dec-2019
7
Catherine D. McCollum, J. R. Messing, and LouAnna Notargiacomo:
Beyond the Pale of MAC and DAC-Defining New Forms of Access Control.
IEEE Symposium on Security and Privacy, 1990
302% above average of year
Last visited: Nov-2022
8
Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, and Clifford E. Kahn:
A VMM Security Kernel for the VAX Architecture.
IEEE Symposium on Security and Privacy, 1990
288% above average of year
Last visited: Sep-2022
9
R. W. Baldwin:
Naming and Grouping Privileges to Simplify Security Management in Large Databases.
IEEE Symposium on Security and Privacy, 1990
248% above average of year
Last visited: Oct-2022
10
Sushil Jajodia and Boris Kogan:
Integrating an Object-Oriented Data Model with Multilevel Security.
IEEE Symposium on Security and Privacy, 1990
240% above average of year
Last visited: Oct-2022