Citation graph for Security and Privacy Papers, 1980-2009
This a directed graph of citations of SP papers to SP papers. It is in "scalable vector graphics" format, and should be viewable in most web browsers. This is a very wide graph, and you will probably want to "zoom" in to see the details.
An arrow from A to B means that A cites B.
The label has the year and approximate filename from the "all years" DVD distributed to all SP and CSF attendees in 2009.
If A is not cited, it is a box.
The height of an oval gives a rough indication of its in-degree.
Holding the mouse cursor over a node will pop-up a small label with the title of the paper.
The color is a gradient from red to blue. Red is for the most recent papers, blue is for the oldest papers, purple is for papers midway between.
The data undoubtedly has errors --- a lot of manual labor went into culling the data and using heuristic methods to turn garbage into links.
This is a graph of the same data, concentrating more on the outdegree of the nodes (papers that are "magnanimous"). The node colors have the same meaning. However, the boxes are papers that do not cite other papers. Taller ellipses indicate papers that cite more papers. The link color is a gradient showing the number of years between a paper and what it cites. Blue is for a short interval, green is for a longer interval.
This was done with the GraphViz tool "dot". Here's the input file. The "zgrviewer", a Java application that works in conjunction with GraphViz, provides an excellent interface for navigating large svg files.
The Most Influential Oakland Papers
These are the papers most often cited by other Oakland papers:
- Security Policies and Security Model, 1982
- Unwinding and Inference Control, 1984
- Specifications for Multi-Level Security and a Hook-Up Property, 1987
- A Comparison of Commercial and Military Computer Security Policies, 1987, Citation Evolution
- Noninterference and the Composability of Security Properties, 1988
- Information Flow in Nondeterministic Systems, 1990
- The Chinese Wall Security Policy, 1989
- Reducing Timing Channels with Fuzzy Time, 1991
- A Sense of Self for Unix Processes, 1996
- Reasoning about Belief in Cryptographic Protocols, 1990
- Decentralized Trust Management, 1996
- Security Models and Information Flow, 1990
- A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions, 1994
- The Use of Logic in the Analysis of Cryptographic Protocols, 1991
- Access Control Meets Public Key Infrastructure, or: Assigning Roles to Strangers, 2000
- Non-Discretionary Controls for Commercial Applications, 1985
- An Augmented Capability Architecture to Support Lattice Security and Traceability of Access, 1984
- A Multilevel Relational Data Model, 1987
- Reasoning About Security Models, 1987
- Covert Channel Capacity, 1987
- The Typed Access Matrix Model, 1992
- Detecting Intrusions Using System Calls: Alternative Data Models, 1999
- A Data Mining Framework for Building Intrusion Detection Models, 1999
- Using Programmer-Written Compiler Extensions to Catch Security Holes, 2002
- Intrusion Detection via Static Analysis, 2001
- Using Mandatory Integrity to Enforce Commercial Security, 1988
- A Secure Identity-Based Capability System, 1989
- An Analysis of Covert Timing Channels, 1991
- A Secure and Reliable Bootstrap Architecture, 1997
The "Gregarious" Oakland Papers
These papers are "gregarious" in that they both cite more than one paper and are themselves cited more than once, and the total of the two is at least 6.
- Information Flow in Nondeterministic Systems
- The Use of Logic in the Analysis of Cryptographic Protocols
- A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions
- Security Models and Information Flow
- Practical Domain and Type Enforcement for UNIX
- Intransitive Non-Interference for Cryptographic Purposes
- Hardening COTS Software with Generic Software Wrappers
- Variable Noise Effects Upon a Simple Timing Channel
- A General Theory of Security Properties
- Formalizing Sensitivity in Static Analysis for Intrusion Detection
- Design of a Role-Based Trust-Management Framework
- Intrusion Detection via Static Analysis
- LOMAC: Low Water-Mark Integrity Protection for COTS Environments
- A Secure Identity-Based Capability System
- An Analysis of Covert Timing Channels
- The Typed Access Matrix Model
- Java Security: From HotJava to Netscape and Beyond
- On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
- Anomaly Detection Using Call Stack Information
- SD3: A Trust Management System with Certified Evaluation
- Preserving Information Flow Properties Under Refinement
- Controlling Logical Inference in Multilevel Database Systems
- The Algebra of Security
- Safety Analysis for the Extended Schematic Protection Model
- A Secure and Reliable Bootstrap Architecture
- Relating Symbolic and Cryptographic Secrecy
- Semantics-Aware Malware Detection
- Views as the Security Objects in a Multilevel Secure Relational Database Management System
- Multiversion Concurrency Control for Multilevel Secure Database System
- Some Conundrums Concerning Separation of Duty
- Probabilistic Interference
- Exploring the BAN Approach to Protocol Analysis
- Simple Timing Channels
- Complete, Safe Information Flow with Decentralized Labels
- Understanding Java Stack Inspection
- Exploring Multiple Execution Paths for Malware Analysis
- A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
- IRM Enforcement of Java Stack Inspection
- Compartmented Mode Workstation: Results Through Prototyping
- Storage Channels in Disk Arm Optimization
- A Semantic Model for Authentication Protocols
- A Logical Language for Specifying Cryptographic Protocol Requirements
- Prudent Engineering Practice for Cryptographic Protocols
- Network Version of the Pump
- A Practically Implementable and Tractable Delegation Logic
Some Statistics
This shows for each five year period, how many papers there were in that period, the total number of authors, the number of papers that cite other Oakland papers, the total number of citations of Oakland papers, and the total number of years "spanned" (i.e., the summation of difference in year published to year cited).\
Years Papers Authors Papers Total Total
that cites years
cite spanned
others
1980-1985: 101 157 13 22 27
1985-1990: 128 262 47 95 237
1990-1995: 120 242 84 251 838
1995-2000: 115 258 59 187 1137
2000-2005: 102 270 65 169 1171
2005-2009: 132 462 89 205 1270
2010 : 31 121 21 56 380